arrow-left2arrow-right2Vector Smart Object7Vector Smart Object2Vector Smart Object111Vector Smart Object1snapchat

Internetwork Engineering Blog

IE and industry related news, articles, announcements, and more.

Time Flies Like An Arrow; Fruit Flies Like Apple

[fa icon="calendar'] April 26, 2018 - Written by Derrick Whisel
Posted in Security

InfraGard recently put out a Flash Alert for a piece of malware called Fruit Fly. I sat through this briefing during last year’s Black Hat/DefCon conference and this malware is unique because it can live in an environment for months, if not years, undetected. There are no ransomware screens alerting the user that they’ve been infected or the ominous blue screen of death. It was first discovered in January of 2017 by Thomas Reed who works for Malwarebytes, who’s also a top Mac OS security researcher and conducted the initial analysis, but since then other variants been identified, dissected, and monitored.

Read More

Did MyFitnessPal Just Have a MAC Attack?

[fa icon="calendar'] April 12, 2018 - Written by Derrick Whisel
Posted in Security

On March 25th, Under Armour was made aware that they had an unauthorized party gain access and acquire data associated with 150 million MyFitnessPal user accounts. The information they could’ve gathered includes, but is not limited to, usernames, email addresses, and hashed passwords. What are hashed passwords? Hashed passwords, from a high level, happen when passwords are ran through a mathematical function to create an encrypted version and a message authentication code (MAC) of a plaintext password. In MyFitnessPal’s case, they used a bcrypt hashing function, the same type that was used by formerly hacked Ashley Madison. After the Ashley Madison hack, the entire database and all password hashes were made available to the hackers of the world and now they have the password hashes of MyFitnessPal too.

 

What does this mean for those of you that have an account on MyFitnessPal? 

Read More

4 Things to Know About the Act to Strengthen Identity Theft Protections

[fa icon="calendar'] February 19, 2018 - Written by Internetwork Engineering
Posted in Security

Just after the New Year, on January 8th, Attorney General Josh Stein and Rep. Jason Saine proposed new legislation aiming to strengthen North Carolina’s laws around data breaches. The proposed law has many aspects that would make North Carolina residents very happy, but what affect will it have on North Carolina businesses?

Read More

How to Secure Your Privacy in the Internet of Me

[fa icon="calendar'] January 26, 2018 - Written by Internetwork Engineering
Posted in Security, IoT

It seems there’s a connected device for everything. You can control the temperature of your house, know who’s ringing your doorbell while you’re not at home, order groceries with the help of a smart assistant and your own voice, and the list goes on. Don’t expect this trend to go away anytime soon. More and more of our daily lives are going to become connected to technology through Internet of Things (IoT) devices. If you thought maintaining your privacy on the internet was already a difficult task, these devices add another layer of needed security to keep your data safe. It’s important to know how your data can be used and what measures you need to take to keep that from happening.

Read More

5 Tips for Building an Incident Response Plan

[fa icon="calendar'] January 10, 2018 - Written by IE Security Team
Posted in Security

Today, the risk of a security incident or data breach is higher than ever. Having an Incident Response Plan is crucial to maintaining a strong security posture so you can protect your business before, during and after an attack.

Read More