E-Brochure info@us-council.com
US Council
  • Home
  • Services
    • Security Testing Services
    • Mobile Phones
    • Proactive Services
    • Incident Response
    • Forensics
    • Test Frameworks
    • Compliance Audit
  • Products
    • US-DR-Suite
    • US-Forensic Field Kit
  • Training
    • Cybersecurity Professional
    • Ethical Hacking & Prevention
    • Network Penetration Testing
          Expert
    • Network Security Expert
    • Digital Forensics Expert
    • Mobile Forensics Expert
    • Wireless Security Expert
    • Certifications
    • Certificate Verification
    • Webinar
  • About Us
  • News
  • Contact Us
  • News

The Future of Cybersecurity Recruiting: Lessons on What Employers Want and What Students Need

22 November, 2022 Dr. Kenneth Williams
The Future of Cybersecurity Recruiting: Lessons on What Employers Want and What Students Need

The cybersecurity industry is facing a challenge to find qualified candidates. Here’s what recruiters, educators, and employers can do to fill the talent gap.

Read more

Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses

14 June, 2022
Cracking the Email Security Code: 12 Best Practices for Small and Midsize Businesses

It only takes one successful attack to spell disaster for a company. Learn how to protect your company with this email security best practice guide.

Read more

76% of Organizations Worldwide Expect to Suffer a Cyberattack This Year

19 April, 2022
Meta targets 'cyber mercenaries' using Facebook to spy

Study shows that more than 35% have suffered seven or more successful attacks.

Read more

Meta targets 'cyber mercenaries' using Facebook to spy

21 December, 2021 Glenn Chapman with Joshua Melvin in Washington
Meta targets 'cyber mercenaries' using Facebook to spy

The social media giant also started warning about 50,000 people it believes may have been targeted in more than 100 nations.

Read more

More Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation

30 November, 2021 Jai Vijayan
Over 1,000 Individuals Arrested in Global Cybercrime-Fighting Operation

HAECHI-II initiative represents Interpol's stepped-up efforts to tackle the operators of financially motivated online scams and other cyberattacks.

Read more

More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic

4 October, 2021 Jai Vijayan
More Than 90% of Q2 Malware Was Hidden in Encrypted Traffic

Analysis of threat trends from last quarter reveals attackers ramped up their use of fileless malware, and zero-day malware accounted for almost two-thirds of all detections.

Read more

New Normal Demands New Security Leadership Structure

3 August, 2021 Kelly Sheridan
New Normal Demands New Security Leadership Structure

At the inaugural Omdia Analyst Summit, experts discuss where the past year has created gaps in traditional security strategy and how organizations can fill them.

Read more

New CPU Baseline for Windows 11 Will Ensure Better Security, Microsoft Says

28 June, 2021 Jai Vijayan
The Workforce Shortage in Cybersecurity Is a Myth

Redmond's latest OS will run only on systems with TPM 2.0 chips.

Read more

The Workforce Shortage in Cybersecurity Is a Myth

11 June, 2021 Michael Roytman
The Workforce Shortage in Cybersecurity Is a Myth

What we really have is an automation-in-the-wrong-place problem.

Read more

Researchers Connect Complex Specs to Software Vulnerabilities

30 April, 2021 Robert Lemos
7 Ways to Reduce Cyber Threats From Remote Workers

Following their release of 70 different vulnerabilities in different implementations of TCP/IP stacks over the past year, two companies find a common link.

Read more

7 Ways to Reduce Cyber Threats From Remote Workers

7 April, 2021 Reuven Aronashvili
7 Ways to Reduce Cyber Threats From Remote Workers

The pandemic's decline won't stop the work-from-home trend nor the implications for cybersecurity, so it's crucial to minimize the threats.

Read more

Can a Programming Language Reduce Vulnerabilities?

16 March, 2021 Robert Lemos
Can a Programming Language Reduce Vulnerabilities?

Rust offers a safer programming language, but adoption is still a problem despite recent signs of increasing popularity.

Read more

Securing Super Bowl LV

27 February, 2021 Sara Peters
Securing Super Bowl LV

A peek at open XDR technology, and defense that held up better than the Kansas City Chiefs.

Read more

The Cybercrime Pandemic Keeps Spreading

8 February, 2021 Marc Wilczek
The Cybercrime Pandemic Keeps Spreading

The World Economic Forum says cyberattacks will be one of the top global business risks over the next 10 years.

Read more

Data Privacy Day 2021: Pandemic Response Data Must Align with Data Privacy Rules

29 January, 2021 Maxine Holt
Data Privacy Day 2021: Pandemic Response Data Must Align with Data Privacy Rules

Amid a pandemic, Data Privacy Day this year brings forth expanded responsibilities for organizations in the response to COVID-19.

Read more

Malware Developers Refresh Their Attack Tools

11 January, 2021 Robert Lemos
Malware Developers Refresh Their Attack Tools

Cisco analyzes the latest version of the LokiBot malware for stealing credentials, finding that its developers have added more misdirection and anti-analysis features.

Read more

How to Build Cyber Resilience in a Dangerous Atmosphere

04 January, 2021 Dirk Schrader
ow to Build Cyber Resilience in a Dangerous Atmosphere

Our polarized climate and COVID-19 are putting the nation's cybersecurity in imminent danger, and it's past time to act.

Read more

Cybersecurity in the Biden Administration: Experts Weigh In

21 December, 2020 Kelly Sheridan
Cybersecurity in the Biden Administration: Experts Weigh In

Security pros and former government employees share their expectations and concerns for the new administration - and their hope for a "return to normal."

Read more

Absolutely Essential AI Cybersecurity Trends to Follow in 2021

17 December, 2020 Annie Qureshi
Absolutely Essential AI Cybersecurity Trends to Follow in 2021

These trends show that AI security is more important in stopping cybersecurity threats and data breaches.

Read more

Digital Distancing with Microsegmentation

1 June, 2020 Trevor Pott
Digital Distancing with Microsegmentation

Physical distancing has blunted a virus's impact; the same idea can be applied to computers and networks to minimize breaches, attacks, and infections.

Read more

Abandoned Apps May Pose Security Risk to Mobile Devices

29 May, 2020 Robert Lemos
Abandoned Apps May Pose Security Risk to Mobile Devices

Mobile providers don't often update users when applications are not supported by developers, security firm says.

Read more

How We Enabled Ransomware to Become a Multibillion-Dollar Industry

2 March, 2020 Srinivas Mukkamala
How to Get the Most Out of Your Security Metrics

As an industry, we must move beyond one-dimensional approaches to assessing ransomware exposures. Asking these four questions will help.

Read more

How to Get the Most Out of Your Security Metrics

28 Jan, 2020 Curtis Simpson
How to Get the Most Out of Your Security Metrics

There's an art to reporting security metrics so that they speak the language of leadership and connect the data from tools to business objectives.

Read more

5 Tips on How to Build a Strong Security Metrics Framework

11 Jan, 2020 Joshua Goldfarb
5 Tips on How to Build a Strong Security Metrics Framework

The carpentry maxim "measure twice, cut once" underscores the importance of timely, accurate, and regular metrics to inform security leaders' risk decisions.

Read more

2020 & Beyond: The Evolution of Cybersecurity

30 Dec, 2019 Daniel Kanchev
Cybersecurity's 'Moral Imperative'

As new technologies disrupt the industry, remember that security is a process, not a goal. Educate yourself on how you can best secure your corner of the Web.

Read more

DHS to Require Federal Agencies to Set Vulnerability Disclosure Policies

3 Dec, 2019 Robert Lemos
Cybersecurity's 'Moral Imperative'

The Cybersecurity and Infrastructure Security Agency (CISA) publishes a draft document mandating a vulnerability disclosure policy and a strategy for handling reports of security weaknesses.

Read more

I 'Hacked' My Accounts Using My Mobile Number: Here's What I Learned

20 Nov, 2019 Nicole Sette
Cybersecurity's 'Moral Imperative'

A feature that's supposed to make your account more secure -- adding a cellphone number -- has become a vector of attack in SIM-swapping incidents. Here's how it's done and how you can protect yourself.

Read more

How HR and IT Can Partner to Improve Cybersecurity

5 Nov, 2019 Joan Goodchild
Cybersecurity's 'Moral Imperative'

With their lens into the human side of business, human resources can be an effective partner is the effort to train employees on awareness and keep an organization secure.

Read more

Cybersecurity's 'Moral Imperative'

31 Oct, 2019 Curtis Franklin Jr.
Cybersecurity's 'Moral Imperative'

Cybersecurity professionals often talk about the economic drivers of security. But should the conversation shift to include a moral component? At least one analyst says "yes."

Read more

Close the Gap Between Cyber-Risk and Business Risk

15 Oct, 2019 Brian Contos, CISO, Verodin
Close the Gap Between Cyber-Risk and Business Risk

Four steps outlining how security teams can better understand their company's cyber-risk and demonstrate to company leadership what's being done to mitigate the resulting business risk.

Read more

Data, Energy, And The Smart City: A Conflicting Relationship

07 Oct, 2019 Larry Alton
Data, Energy, And The Smart City: A Conflicting Relationship

Smart cities are the future of our urban centers, and even of suburbs and small towns – and this transformation is critical. Equipped with sensors and constantly collecting data, this tech revolution aims to make crowded cities more efficient, keep residents safer, and even helpprotect our environment through resource management. Making this shift, however, will require big investments on the part of both government bodies and businesses. This is particularly true when it comes to reducing energy waste.

Read more

The Etiquette of Respecting Privacy in the Age of IoT

30 Sep, 2019 Sara Peters
Urgent Tips To Guard Against New IoT Cybersecurity Threats

Is it rude to ask someone to shut off their Alexa? Ask the family who's written the book on etiquette for nearly 100 years - the descendants of Emily Post herself.

Read more

Urgent Tips To Guard Against New IoT Cybersecurity Threats

16 Sep, 2019 Diana Hope
Urgent Tips To Guard Against New IoT Cybersecurity Threats

IoT cybersecurity threats are continually increasing and becoming more sophisticated, so it's important to protect yourself.

Read more

More Than 99% of Cyberattacks Need Victims' Help

10 Sep, 2019 Kelly Sheridan
More Than 99% of Cyberattacks Need Victims' Help

Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.

Read more

The Right to Be Patched: How Sentient Robots Will Change InfoSec Management

29 Aug, 2019 Sara Peters
Why the Network Is Central to IoT Security

It won't be long before we consider embodied AI as a form of "life" - and that will have a variety of paradigm-shifting, somewhat irritating, and potentially hilarious impacts on the daily lives of cybersecurity and privacy professionals.

Read more

Third-Party Cyber Risk Management: Getting to Know Your Vendor

16 Aug, 2019 Fred Kneip
Why the Network Is Central to IoT Security

What's missing in today's TPCRM programs is visibility into third-party ecosystems. Here's how to bridge the gap.

Read more

Why the Network Is Central to IoT Security

31 Jul, 2019 Jon Green
Why the Network Is Central to IoT Security

Is there something strange about your network activity? Better make sure all of your IoT devices are under control.

Read more

Most Organizations Lack Cyber Resilience

13 July, 2019 Marc Wilczek
Most Organizations Lack Cyber Resilience

Despite increasing threats, many organizations continue to run with only token cybersecurity and resilience.

Read more

Key Biscayne Third Florida City To Report Data Breach

01 July, 2019 Hank Tester
Key Biscayne Third Florida City To Report Data Breach

The Village of Key Biscayne hacking comes a week after Riviera Beach in South Florida agreed to pay $600,000 in ransom to hackers last week.

Read more

Better Cybersecurity Research Requires More Data Sharing

17 June, 2019 Robert Lemos
Better Cybersecurity Research Requires More Data Sharing

Researchers at the Workshop on the Economics of Information Security highlight the cost savings of sharing cybersecurity data and push for greater access to information on breaches, attacks, and incidents.

Read more

Cyberattackers Focus on More Subtle Techniques

26 April, 2019 Robert Lemos
Cyberattackers Focus on More Subtle Techniques

Spam has given way to spear phishing, cryptojacking remains popular, and credential spraying is on the rise.

Read more

Tips for the Aftermath of a Cyberattack

18 April, 2019 Kelly Sheridan
Tips for the Aftermath of a Cyberattack

Incident response demands technical expertise, but you can't fully recover without non-IT experts.

Read more

3 Lessons Security Leaders Can Learn from Theranos

05 April, 2019 Chad Loeven
3 Lessons Security Leaders Can Learn from Theranos

Theranos flamed out in spectacular fashion, but you can still learn from the company's "worst practices."

Read more

War of the digital worlds: A day in the life of a threat intelligence analyst

25 March, 2019 Alex Hinchliffe
War of the digital worlds: A day in the life of a threat intelligence analyst

If a company or individual is powerful, they are vulnerable to a dangerous cyber attack, and that's where we come in.

Read more

To Improve Security, We Must Focus on Its People

07 March, 2019 Kelly Sheridan
To Improve Security, We Must Focus on Its People

New technology can help cybersecurity bridge the talent gap, but tech won't do much without people to operate it.

Read more

2018 Was Second-Most Active Year for Data Breaches

15 February, 2019 Jai Vijayan
2018 Was Second-Most Active Year for Data Breaches

Hacking by external actors caused most breaches, but Web intrusions and exposures compromised more records, according to Risk Based Security.

Read more

'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers

21 January, 2019 Sara Peters
'We Want IoT Security Regulation,' Say 95% of IT Decision-Makers

New global survey shows businesses are valuing IoT security more highly, but they are still challenged by IoT data visibility and privacy.

Read more

New 'Crypto Dusting' Attack Gives Cash, Takes Reputation

9 January, 2019 Curtis Franklin Jr.
New 'Crypto Dusting' Attack Gives Cash, Takes Reputation

This new form of crypto wallet fraud enlists unwary consumers and companies to help defeat anti-money laundering methods for law enforcement and regulators.

Read more

2018: The Year Machine Intelligence Arrived in Cybersecurity

29 December, 2018 Curtis Franklin Jr.
Can You Use Bitcoin to Pay for Travel?

Machine intelligence, in its many forms, began having a significant impact on cybersecurity this year - setting the stage for growing intelligence in security automation for 2019.

Read more

Can You Use Bitcoin to Pay for Travel?

14 December 2018 Million Mile Secrets
Can You Use Bitcoin to Pay for Travel?

When most people think of buying tickets for a flight, or making other travel-related purchases, they might reach into their wallet for their credit card.  But did you know you might be able to pay with a form of digital cryptocurrency, like Bitcoin?

Read more

Criminals Use Locally Connected Devices to Attack, Loot Banks

8 December 2018 Jai Vijayan
Criminals Use Locally Connected Devices to Attack, Loot Banks

Tens of millions of dollars stolen from at least eight banks in East Europe, Kasperksy Lab says.

Read more

8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure

28 November 2018 JD Sherry
8 Tips for Preventing Credential Theft Attacks on Critical Infrastructure

Stolen credentials for industrial control system workstations are fast becoming the modus operandi for ICS attacks by cybercriminals.

Read more

Worst Malware and Threat Actors of 2018

5 November 2018 Curtis Franklin Jr.
Worst Malware and Threat Actors of 2018

Two reports call out the most serious malware attacks and attackers of the year (so far).

Read more

Destructive Cyberattacks Spiked in Q3

31 October 2018 Jai Vijayan
Destructive Cyberattacks Spiked in Q3

Instead of simply fleeing when discovered, adversaries are actively engaging with incident response teams, a new Carbon Black study finds.

Read more

A Cybersecurity Weak Link: Linux and IoT

17 October 2018 Migo Kedem
A Cybersecurity Weak Link: Linux and IoT

Linux powers many of the IoT devices on which we've come to rely -- something that enterprises must address.

Read more

A False Sense of Security

10 October 2018 Steve Durbin
A False Sense of Security

Emerging threats over the next two years stem from biometrics, regulations, and insiders.

Read more

4 Traits of a Cyber-Resilient Culture

29 September 2018 Ericka Chickowski
New Apache Struts Vulnerability Leaves Major Websites Exposed

In the data-driven enterprise, myriad types of data have become a new form and flow of currency. Why, then, hasn't the CISO achieved parity with the CFO?

Read more

Managing Data the Way We Manage Money

27 September 2018 Dave Sikora
New Apache Struts Vulnerability Leaves Major Websites Exposed

In the data-driven enterprise, myriad types of data have become a new form and flow of currency. Why, then, hasn't the CISO achieved parity with the CFO?

Read more

New Apache Struts Vulnerability Leaves Major Websites Exposed

24 August 2018 Curtis Franklin Jr.
New Apache Struts Vulnerability Leaves Major Websites Exposed

The vulnerability, found in Struts' core functionality, could be more critical than the one involved in last year's Equifax breach.

Read more

Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft

10 August 2018 Kelly Sheridan
Cloud Intelligence Throwdown: Amazon vs. Google vs. Microsoft

A closer look at native threat intelligence capabilities built into major cloud platforms and discussion of their strengths and shortcomings.

Read more

5 Ways Small Security Teams Can Defend Like Fortune 500 Companies

27 July 2018 Mike Armistead
5 Ways Small Security Teams Can Defend Like Fortune 500 Companies

Keep your company protected with a mix of old- and new-school technologies.

Read more

Businesses Struggle to Build 'Security-First' Culture

11 July 2018 Kelly Sheridan
Businesses Struggle to Build 'Security-First' Culture

New Accenture study finds half of businesses provide cybersecurity training for new hires and only 40% of CISOs prioritize building or expanding insider threat programs.

Read more

Why Sharing Intelligence Makes Everyone Safer

2 July 2018 Sanjay Vidyadharan
Why Sharing Intelligence Makes Everyone Safer

Security teams must expand strategies to go beyond simply identifying details tied to a specific threat to include context and information about attack methodologies.

Read more

Artificial Intelligence & the Security Market

23 June 2018 Curtis Franklin Jr.
Artificial Intelligence & the Security Market

A glimpse into how two new products for intrusion detection and entity resolution are using AI to help humans do their jobs.

Read more

Trump-Kim Meeting Was a Magnet For Russian Cyberattacks

19 June 2018 Jai Vijayan
New Ransomware Attacks Endpoint Defenses

Attacks directed at targets in Singapore went through the roof earlier this week.

Read more

'EFAIL' Is Why We Can’t Have Golden Keys

06 June 2018 Adam Shostack
New Ransomware Attacks Endpoint Defenses

A deep dive into the issues surrounding an HTML email attack.

Read more

Cybercrime Is Skyrocketing as the World Goes Digital

02 June 2018 Marc Wilczek
New Ransomware Attacks Endpoint Defenses

If cybercrime were a country, it would have the 13th highest GDP in the world.

Read more

Get Ready for 'WannaCry 2.0'

18 May 2018 Kelly Jackson Higgins
New Ransomware Attacks Endpoint Defenses

Another widespread worm attack is "inevitable," but spreading a different more lucrative or destructive payload, experts say.

Read more

Properly Framing the Cost of a Data Breach

09 May 2018 Jeremy Wittkop
New Ransomware Attacks Endpoint Defenses

The expenses and actions typically associated with a cyberattack are not all created equal. Here's how to explain what's important to the C-suite and board.

Read more

10 types of hackers and how they'll harm you

25 April 2018 Roger A. Grimes
New Ransomware Attacks Endpoint Defenses

Understanding the different types of hackers, what motivates them, and the malware they use can help you identify the attacks you are most likely to face and how to properly defend yourself and your organization.

Read more

Microsoft to Roll Out Azure Sphere for IoT Security

17 April 2018 Kelly Sheridan
New Ransomware Attacks Endpoint Defenses

Azure Sphere, now in preview, is a three-part program designed to secure the future of connected devices and powered by its own custom version of Linux.

Read more

Verizon DBIR: Ransomware Attacks Double for Second Year in a Row

10 April 2018 Sara Peters
New Ransomware Attacks Endpoint Defenses

Outside attackers still the biggest problem - except in healthcare.

Read more

New Ransomware Attacks Endpoint Defenses

02 April 2018 Curtis Franklin Jr.
New Ransomware Attacks Endpoint Defenses

AVCrypt tries to disable anti-malware software before it can be detected and removed.

Read more

Criminals Using Web Injects to Steal Cryptocurrency

26 March 2018 Jai Vijayan
Criminals Using Web Injects to Steal Cryptocurrency

Man-in-the-browser attacks targeting Blockchain.info and Coinbase websites, SecurityScorecard says.

Read more

Cryptojacking Threat Continues to Rise

19 March 2018 Curtis Franklin Jr.
Cryptojacking Threat Continues to Rise

Unauthorized cryptocurrency mining can consume processing power and make apps unavailable as well as lead to other malware.

Read more

Hacking Back & the Digital Wild West

10 March 2018 Levi Gundert
Hacking Back & the Digital Wild West

Far from helping organizations defend themselves, hacking back will escalate an already chaotic situation.

Read more

How & Why the Cybersecurity Landscape Is Changing

02 March 2018 Zeus Kerravala
Threats from Mobile Ransomware & Banking Malware Are Growing

A comprehensive new report from Cisco should "scare the pants off" enterprise security leaders.

Read more

Threats from Mobile Ransomware & Banking Malware Are Growing

27 February 2018 Jai Vijayan
Threats from Mobile Ransomware & Banking Malware Are Growing

The number of unique mobile malware samples increased sharply in 2017 compared to a year ago, according to Trend Micro.

Read more

6 Cybersecurity Trends to Watch

26 February 2018 Misha Govshteyn
6 Cybersecurity Trends to Watch

Expect more as the year goes on: more breaches, more IoT attacks, more fines..

Read more

Breach Exposes Sensitive California State Employee Data

20 February 2018 Michael Hill
Breach Exposes Sensitive California State Employee Data

News has surfaced of a breach of sensitive data of California state employees.

Read more

3 Tips to Keep Cybersecurity Front & Center

15 February 2018 Greg Kushto
Security vs. Speed: The Risk of Rushing to the Cloud

In today's environment, a focus on cybersecurity isn't a luxury. It's a necessity, and making sure that focus is achieved starts with the company's culture.

Read more

Security vs. Speed: The Risk of Rushing to the Cloud

7 February 2018 Kelly Sheridan
Security vs. Speed: The Risk of Rushing to the Cloud

Companies overlook critical security steps as they move to adopt the latest cloud applications and services.

Read more

No honour among thieves: Hackers using Tor proxy site to steal ransomware operators' bitcoins

30 January 2018 India Ashok
No honour among thieves: Hackers using Tor proxy site to steal ransomware operators' bitcoins

Ransomware operators have begun warning their victims to not use the tor proxy sites for making ransom payments.

Read more

Jackpotting attacks hit U.S. ATMs; spit out cash in seconds

29 January 2018 Waqas
Jackpotting attacks hit U.S. ATMs; spit out cash in seconds

Jackpotting is an attack / technique to exploit ATMs to make them dispense cash without withdrawing it from a bank account – Now, U.S. ATMs are under Jackpotting attack.

Read more

Where to Find Security Holes in Serverless Architecture

19 January 2018 Kelly Sheridan
Where to Find Security Holes in Serverless Architecture

Serverless architectures take away business responsibility for server management, but security should still be top of mind.

Read more

BlackWallet hacked: Over $400,000 in cryptocurrency stolen after hackers hijack DNS server

16 January 2018 Hyacinth Mascarenhas
BlackWallet hacked: Over $400,000 in cryptocurrency stolen after hackers hijack DNS server

I am sincerely sorry about this and hope that we will get the funds back," the creator of BlackWallet said.

Read more

What is FakeBank? New banking malware can intercept SMS messages to steal sensitive data and funds

11 January 2018 Hyacinth Mascarenhas
images

FakeBank can steal sensitive information from the device including phone numbers, balance on a linked bank card and location data.

Read more

The Coolest Hacks of 2017

27 December 2017 Kelly Jackson Higgins
images

Robots, voting machines, machine learning, and the wind were among the hacks security researchers pulled off this year.

Read more

Developers Can Do More to Up Their Security Game: Veracode

21 December 2017 Paul Shomo
images

Forensic examiners don't work for bounties. They do what is required to catch criminals, pedophiles, or corporate embezzlers, and now their important security research is finally being acknowledged.

Read more

Developers Can Do More to Up Their Security Game: Veracode

28 November 2017 Jai Vijayan
images

Developers can play a vital role in accelerating the adoption of AppSec practices, security vendor says.

Read more

Cyber Forensics: The Next Frontier in Cybersecurity

27 November 2017 Brendan Saltaformaggio
images

We can now recover evidence from the RAM on a cellphone, even if the account is locked, and use it to prosecute a case.

Read more

10 Scariest Ransomware Attacks of 2017

02 November 2017 Kelly Sheridan
images

A look back at WannaCry, NotPetya, Locky, and other destructive ransomware campaigns to infect the world this year.

Read more
  • Security Testing Services
  • Mobile Phones
  • Proactive Services
  • Incident Response
  • Forensics
  • Test Frameworks
  • Compliance Audit

Popular Posts

  • Cybersecurity in the Biden Administration: Experts Weigh In
  • Worst Malware and Threat Actors of 2018
  • Destructive Cyberattacks Spiked in Q3
  • A Cybersecurity Weak Link: Linux and IoT
  • A False Sense of Security
  • 4 Traits of a Cyber-Resilient Culture
  • Managing Data the Way We Manage Money
  • New Apache Struts Vulnerability Leaves Major Websites Exposed
Our Services
  • Security Testing Services
  • Mobile Phones
  • Proactive Services
  • Incident Response
  • Forensics
  • Test Frameworks
  • Compliance Audit
Quick Links
  • Certifications
  • Certificate Verification
  • About Us
  • News
  • Contact Us
Follow Us
2023 US Council. All rights reserved.