About David Lissberger

This author has not yet filled in any details.
So far David Lissberger has created 39 blog entries.

The Emergence of Cryptoworms Shouldn’t Alter Your Security Methods

One of the most confusing aspects of malware is that infiltrators never devised a better method of getting their software onto networks. Up to this point, ransomware and malware developers have relied on phishing emails and watering holes (targeted, compromised web sites hosting malicious code) as delivery methods; depending on trickery and the end user’s naiveté. Now, that’s changed. Take for example the previously discussed SamSam, malware that targets the health care industry. One of the most notable features [...]

By | 2017-10-13T05:17:55+00:00 June 30th, 2016|Network Security|Comments Off on The Emergence of Cryptoworms Shouldn’t Alter Your Security Methods

Ransomware’s Evolving, But You Can Beat It

ransomware eye looks at viewer concept. A quick bit of background before we dive into the topic of today’s post — the evolution of ransomware. What follows is an admittedly incomplete list of the evolutions and variants of the Cryptolocker virus. Cryptolocker — The granddaddy. Infections occurred through spam, fishing and exploit kits. It was famously taken down by Operation Tovar. Teslacrypt — A Cryptolocker copycat that was distributed via a Flash vulnerability. It targeted gamers’ files. [...]

By | 2017-10-13T05:40:48+00:00 April 27th, 2016|Network Security|Comments Off on Ransomware’s Evolving, But You Can Beat It

Network Security Spring Clean: Be Bold, and Boot That Box (Pun Intended)

Today, in the final installment of our Security Spring Clean series, we encourage you to be bold. We are going to guess, and we think we will be right, that somewhere in the back corner of your server room there’s a box that has been plugged into the switch since no one knows when. Another thing that no one knows: what that box actually does. So, here’s where you need to be bold, intrepid admin. Dive in. Figure out what [...]

By | 2017-10-17T08:49:24+00:00 April 4th, 2016|Network Security|Comments Off on Network Security Spring Clean: Be Bold, and Boot That Box (Pun Intended)

Network Security Spring Clean: Don’t Forget About Your Data

Having the right hardware is important. Software too. And you know how we feel about the importance of training your people. But the heart of any business is its data. For some businesses, it helps them get products to market faster. For other businesses, the data is the product. Keeping that data safe and accessible by they people who have a legitimate right to it (and need for it) is why so much research is put into buying the [...]

By | 2017-10-11T12:46:09+00:00 March 22nd, 2016|Network Security, Uncategorized|Comments Off on Network Security Spring Clean: Don’t Forget About Your Data

Network Security Spring Clean: Don’t Let Your People Be Your Problem

The weakest part of any network isn’t some tool in the data center or some device on the wire. No, it’s the people who are logging in. We’ve said it repeatedly here, and as long as people keep providing us with examples to cite then we’ll keep saying it over and over. The latest example comes out of Britain and its Office of Communications, or, as they like to call it, Ofcom. Turns out that a former employee downloaded [...]

By | 2017-10-11T12:49:07+00:00 March 16th, 2016|Network Security|Comments Off on Network Security Spring Clean: Don’t Let Your People Be Your Problem

Network Security Spring Clean: Get a Handle on Your Hardware

If science does anything for you then you’ve no doubt heard of the large hadron collider. It’s the particle accelerator operated by CERN, the European agency focused on nuclear research. The organization recently decided that it was time for large-scale improvements to its most powerful piece of equipment. Those should happen over the next few years, but engineers in Geneva are going to have to do some prep work first. Included in that is removing some unused cables from [...]

By | 2017-10-11T12:52:58+00:00 March 7th, 2016|Network Security|Comments Off on Network Security Spring Clean: Get a Handle on Your Hardware

Reactive Security vs. Predictive Security: Why You Should Use Both

Traditionally, network security has been reactionary. Protection didn’t often happen until after infection. But in the early days that was OK. Compared to now, networks weren’t complicated. Finding and removing malicious software was relatively easy. Today, however, networks are more complicated and the abilities of hackers to get inside are more sophisticated. It’s not uncommon for the bad software to be buried so deep in a network that infections go undetected for months (or years). Obviously, this means that our [...]

By | 2017-10-11T12:57:24+00:00 March 1st, 2016|Network Security|Comments Off on Reactive Security vs. Predictive Security: Why You Should Use Both

The Dyre Raids and the Importance of Security Teams

Security headlines over the last week or so have been talking about Russian police raids at the end of November that may have put an end to the Dyre malware variant. The ring of cybercriminals taken down in those raids was almost the exclusive users of Dyre — malware that targets the banking and financial industry — and, according to a story at Forbes.com, this group of cybercriminals used it very well. “The hackers were stealing tens of millions of [...]

By | 2017-10-11T12:59:21+00:00 February 17th, 2016|Network Security|Comments Off on The Dyre Raids and the Importance of Security Teams

Four Security Concepts to Know in 2016

Network security can’t be a passive thing. Those who want into your network are constantly figuring out new ways to get there. If you’ve read this blog for any length of time, that should be a somewhat familiar message. And if that message feels familiar, so should this one. Because hackers are evolving their methods of attacking your networks then you need to be evolving your methods of defending yourself from them. One of the best ways to do that [...]

By | 2017-10-11T13:06:29+00:00 February 16th, 2016|Uncategorized|Comments Off on Four Security Concepts to Know in 2016