Social Media Safety

Posted Posted in Helpful Tips, Internet Safety, News

It has become near effortless to discover individuals or groups which one can connect with online that share a common characteristic. According to Merriam-Webster, a social network is defined as “a network of individuals (such as friends, acquaintances, and coworkers) connected by interpersonal relationships.” This social network connection is strengthened through the daily use of […]

Global Information Assurance Certification logo

Attackers Inside the Walls: Detecting Malicious Activity

Posted Posted in Technical Articles

Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source software can fill this gap, but these free solutions may not provide full coverage for known attacks, especially once the attacker is inside the perimeter. This paper investigates the IDS capabilities of a stand-alone Security […]

Center for Internet Security logo

Security Primer – IcedID

Posted Posted in Technical Articles

IcedID, also known as BokBot, is a modular banking trojan that targets user financial information and is capable of acting as a dropper for other malware. It uses a man-in-the-browser attack to steal financial information, including login credentials for online banking sessions. Once it successfully completes its initial attack, it uses the stolen information to […]

Center for Internet Security logo

Security Primer – Ransomware

Posted Posted in Technical Articles

Throughout 2019, state, local, tribal, and territorial (SLTT) government entities are increasingly encountering ransomware attacks resulting in significant network downtime, delayed services to constituents, and costly remediation efforts. As of September 24, 2019, the MS-ISAC received approximately 60% more reported ransomware incidents affecting SLTT governments in 2019 than for the entire year of 2018. Not […]

Center for Internet Security logo

Security Primer – TrickBot

Posted Posted in Technical Articles

TrickBot is a modular banking trojan that targets sensitive information and acts as a dropper for other malware. Since June 2019, the MS-ISAC is observing an increasingly close relationship between initial TrickBot infections and eventual Ryuk ransomware attacks. The malware authors are continuously releasing new modules and versions of TrickBot to expand and refine its […]

Computer Security Resource Center logo

BowTie – A deep learning feedforward neural network for sentiment analysis

Posted Posted in Technical Articles

How to model and encode the semantics of human-written text and select the type of neural network to process it are not settled issues in sentiment analysis. Accuracy and transferability are critical issues in machine learning in general. These properties are closely related to the loss estimates for the trained model. I present a computationally-efficient […]

Computer Security Resource Center logo

Internet of Things (IoT) Trust Concerns (Draft Document)

Posted Posted in Technical Articles

This draft white paper identifies seventeen technical trust-related issues that may negatively impact the adoption of IoT products and services. The paper offers recommendations for mitigating or reducing the effects of these concerns while also suggesting additional areas of research regarding the subject of “IoT trust.” This document is intended for a general information technology […]