Although Dell SecureWorks was not engaged to test this particular customer support component (eg: the on-the-box support certificate), Dell as a whole is taking steps to actively address this issue including re-evaluating our processes company-wide to ensure we’re providing the utmost security to our customers. Removal steps are available now.
Dell SecureWorks General Manager & Vice President Mike Cote recently joined a panel at the U.S. Chamber of Commerce’s Cybersecurity Summit, discussing the role that boards play in the mitigation of cybersecurity risk. Here, he elaborates on what areas of focus boards and the C-suite should consider to ensure resiliency against a breach.
Staying hidden is one of the primary goals of an attacker, making the arms race between cybercriminals and security professionals a never-ending battle. At the recent Black Hat Europe 2015 conference in Amsterdam, Dell SecureWorks’ Pierre-Marc Bureau and fellow researcher Christian Dietrich from security vendor CrowdStrike brought attendees behind the frontlines of that fight and revealed how attackers are hiding their command and control communication in an effort to dodge detection.
At home, work, and on the go, we are constantly connected, making many things more convenient but also more vulnerable. Whether on your computer, tablet or smartphone, it’s critical to be vigilant about keeping your information as secure as possible. As the 12th Annual National Cyber Security Awareness Month comes to a close, Dell SecureWorks’ Jeff Multz offers tips to reduce the risk of a compromise and staying protected while remaining connected.
You’ve got the basics of a cybersecurity strategy in place and moved from a crawl to a walk. But how do you get to a “run” when it comes to obtaining and maintaining a fit and healthy network? In the final installment of this three-part series, we look at where to go once you have the basic building blocks of security in place to ensure your network is in A+ condition.
Social engineering – tricking people online – is not a new concept – however, the tactics have changed, and the accessibility of data has made it easier for threat actors to create messages that seem legit. But there are steps you can take to mitigate the risk.
Recently, Dell SecureWorks Counter Threat Unit™ (CTU) researchers uncovered a set of fake profiles supporting a suspected Iran-based threat group’s cyber operations and documented the findings in a recent threat analysis,
Just as no business becomes an overnight sensation, neither does an organization’s security posture. It takes time, patience and hard work. You must start with the basics, work up to advanced moves and commit to the business for life. In my security plan “Crawl, Walk, Run,” I present to you, in three separate blog posts, the basic steps to obtaining and maintaining a fit and healthy network.
Just as no business becomes an overnight sensation, neither does an organization’s security posture. Security is a process, not a destination. It takes time, patience and hard work. You must start with the basics, work up to advanced moves and commit to security for life. Here, security evangelist Jeff Multz presents the basic steps to obtaining and maintaining a fit and healthy network in this three-part series.
Dell SecureWorks’ Director of Malware Research, Joe Stewart discusses how YouTube channels are being attacked by malicious hackers. One does not simply DDoS Google in order to silence a YouTube channel; no one has that kind of bandwidth. Instead, what the attacker did was to spam the channel with “dislikes,” a way to try and impact the revenue stream of the channel operator by manipulating YouTube’s view recommendation system.