Showing 21 - 30 of 44 results for password
Zero Day Exploit Cracks San Bernardino iPhone
https://neovera.com/zero-day-exploit-cracks-san-bernardino-iphone/A zero day exploit normally takes the following form: attack occurs on a network or networks and chaos ensues. However, a rather unique use of a zero day exploit is gaining ground, begging the questio...
File Retrieval Solution for Petya Ransomware Victims
https://neovera.com/file-retrieval-solution-petya-ransomware-victims/If readers have heard about Petya, the newest in a slew of recent ransomware attacks, hopefully it's been through a blog like this. The newest "IT" malware attack to hit the scene, Petya is hidden wit...
Multifactor Authentication: The Time Is Now
https://neovera.com/multi-factor-authentication/It may not be breaking news, but this is a major announcement that companies need to embrace: passwords are out; multifactor authentication is in. In it's simplest form, an ATM transaction is an exam...
Hacks on Third Party Applications Pose Hazard to Long-Haul Vehicles
https://neovera.com/hacks-third-party-applications-pose-hazard-long-haul-vehicles/Previous posts have addressed the security issues surrounding vehicles, third party applications and IoT - specifically, what barriers are in place to stop hackers from not only stealing data from you...
The DROWN Attack and How To Stop It
https://neovera.com/the-drown-attack-and-how-to-stop-it/A new cyber attack method, dubbed DROWN by its creators, is showing vulnerabilities in servers using old encryption methods like SSL and TLS that are found on millions of websites. The researchers e...
Google Stepping Up Safe Browsing Defenses
https://neovera.com/google-stepping-up-safe-browsing-defenses/Many of us have lives that revolve around being “connected”, and we often don’t suspect someone could use the Internet for harm. Unfortunately, cyber crime is at it’s highest levels and th...
Emerging Cyber Threat – Juniper ScreenOS Backdoor
https://neovera.com/emerging-threat-juniper-screenos-backdoor/Nobody likes eavesdroppers, ESPECIALLY when the eavesdroppers are state-sponsored hackers, quite possibly from your own government. While officially unconfirmed, the discovery of backdoors in Junipe...
Notable Breaches: The What, Why, and How to Avoid Them
https://neovera.com/notable-breaches-avoid/Online breaches have become a significant part of the discussion when it comes to protecting consumer and organization data across multiple industries - from government groups to private companies an...
Neovera Threat Intelligence Short Report – December 31st, 2015
https://neovera.com/4183-2/Emerging Threat - Juniper ScreenOS Backdoor
An advisory has been issued that unauthorized code in the ScreenOS software that powers Juniper's NetScreen firewalls has been discovered. There are two ...
Neovera Threat Intelligence Short Report – December 14th, 2015
https://neovera.com/4110-2/Emerging Threat - CopyKittens APT activity
Matryoshka is malware built by CopyKittens, an espionage group that has been attacking Israeli targets. Matryoshka is spread through spear phishing with a...
Talk to a Neovera Expert
Let’s discuss a solution that meets your business objectives and technical needs.