Profile

Cover photo
Verified local business
Cyveillance Inc
Internet Service Provider
Today 9:00 am – 5:00 pm
31 followers|50,701 views
AboutPostsPhotosYouTube

Stream

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nus4w #mobile #cybersecurity - 8 @Android security tips for IT, corporate users

"To do significant damage in the mobile world, malware needs to act on devices that have been altered at an administrative level."
A set of security experts shares actionable tips for IT departments and users to help reduce the risk associated with the popular mobile OS.
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nuryh #IoT #cybersecurity - Internet of Things: Whose data is it, anyway?

"Who is in control of all this data? Is it us consumers, or is it the service providers? What happens to the data – is it used just to provide services to the customers, or is it also sold off to other third parties?"
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/NvZs3 #phishing #cybersecurity - Link Shorteners in Phishing Attacks, Part I
Link Shorteners in Phishing Attacks, Part I: Which Shorteners Do Criminals Use, and Which Brands Are Targeted? Phishing. In this three-part blog series, we'll discuss original research presented by Cyveillance phishing experts at this week's Anti-Phishing Working Group's eCrime Symposium in ...
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/NvSg2 #phishing #cybersecurity - Link Shorteners in Phishing Attacks, Part I
Link Shorteners in Phishing Attacks, Part I: Which Shorteners Do Criminals Use, and Which Brands Are Targeted? Phishing. In this three-part blog series, we'll discuss original research presented by Cyveillance phishing experts at this week's Anti-Phishing Working Group's eCrime Symposium in ...
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nuq1X #malware #cybersecurity - Attackers use spam to infect POS terminals with new malware

"The emails had fake resumes attached that were actually Word documents with an embedded malicious macro. If allowed to run, the macro installed a program that downloaded additional malware from a remote server."
They're likely counting on some employees misusing such terminals to browse the Web or check their personal email at work
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nupnc #privacy #vulnerability - @Google 'Master Cookie' remains after Android factory reset

“We estimate that up to 500 million devices may not properly sanitise their data partition where credentials and other sensitive data are stored, and up to 630 million may not properly sanitise the internal SD card where multimedia files are generally saved.”
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nr8nD #cybersecurity #technews - If Apple Launched iPhone 20 Years Ago, here's how it would look:
1
Add a comment...
In their circles
1 person
Have them in circles
31 people
Concise-Courses.com's profile photo
Anonymous Advocate's profile photo
Angelo G. Longo's profile photo
Andrew Sharetts's profile photo
David Pollard's profile photo
A1 Data Recovery's profile photo
Filippo Mottini's profile photo
Tempy Wright's profile photo
Mujidat Salau's profile photo

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/NurRp #cybersecurity #technews - #NSA Trying to Track Your Smartphone Finger Strokes

“People can forge your handwriting in two dimensions, but they couldn’t forge it in three or four dimensions. Three is the pressure you put in, in addition to the two dimensions on the paper. The fourth dimension is time. The most advanced handwriting-type authentication tracks you in four dimensions.”
Smartphone technology built by Lockheed Martin promises to verify a user's identity based on the swiftness and shape of the individual’s finger strokes on a touch screen.
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nurl7 #ransomware #cybersecurity - Meet ‘Tox': Ransomware for the Rest of Us

"The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free."
Similar to other threats, ransomware has now appeared in an easy-to-deploy cybercrime kit. The malware is called Tox, and it's free.
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/Nuqer #cybersecurity #technews - Could thieves use jamming technology to steal your car?

"In December last year, a 25-year-old man was convicted of using a signal jammer to break into cars in the Greater Manchester area. Michael Fennell used a signal jammer bought outside of the UK for just £35 to target central Manchester car parks."
Theoretical attack becomes real as criminals begin using jammers to block remote locking car keys
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/NupMI #IoT #cybersecurity - Why we need a standardized IoT tech stack

"The current state of IoT development is heavily risk-prone. Designs often work well “in the lab” but fail at a high rate when deployed in the wild. Intermittent Internet connectivity, firewalls, proxies, spotty cellular connects, and other “real-world” bumps hamper success."
Until an IoT tech stack is codified and adopted, IoT will be hobbled by security issues, time to market challenges, and stability and reliability problems.
1
Add a comment...

Cyveillance Inc

Shared publicly  - 
 
http://ow.ly/NuorG #cybersecurity #technews - Free Password Recovery Tool Works for Windows and Linux

"The tool is aimed at IT professionals as an easy solution for retrieving lost passwords, but it can also be integrated as a module of a nefarious project with the purpose of exfiltrating sensitive information from user’s computer."
LaZagne works for popular programs by default
1
Add a comment...
Contact Information
Map of the business location
11091 Sunset Hills Rd #210 Reston, VA 20190
11091 Sunset Hills Road #210USVirginiaReston20190
(703) 351-1000cyveillance.com
Internet Service Provider, Computer Security ServiceToday 9:00 am – 5:00 pm
Monday 9:00 am – 5:00 pmTuesday 9:00 am – 5:00 pmWednesday 9:00 am – 5:00 pmThursday 9:00 am – 5:00 pmFriday 9:00 am – 5:00 pmSaturday ClosedSunday Closed
World Leader in Cyber Intelligence
Google+ URL
People
In their circles
1 person
Have them in circles
31 people
Concise-Courses.com's profile photo
Anonymous Advocate's profile photo
Angelo G. Longo's profile photo
Andrew Sharetts's profile photo
David Pollard's profile photo
A1 Data Recovery's profile photo
Filippo Mottini's profile photo
Tempy Wright's profile photo
Mujidat Salau's profile photo
Write a review
Review Summary
Be the first to review
Photos
Scrapbook photo 2
Upload public photo
Your Activity