Speaking of Malware | The Strongarm Blog

Strongarm’s Top Security Predictions for 2018

January 9, 2018 | By Todd O'Boyle

There were a few things that caught us by surprise in 2017. It’s good to reflect on those when thinking about the future. The first was the rise of using quasi-legal click harvesting and cryptocurrency mining to make money. Criminals are finding ways to make...


10 Security Influencers You Should Follow on Twitter

November 21, 2017 | By Todd O'Boyle

Social media is a great resource for keeping up with the latest in cybersecurity, including current threats, emerging technology, hiring best practices, and more. In particular, Twitter offers a way to stay in the loop, whether you want to learn more about protecting your company...


October Scam of the Month: Crypto-currency Mining

October 18, 2017 | By Todd O'Boyle

You’re probably familiar with Bitcoin, the online cryptocurrency that has garnered quite a bit of both positive and negative attention. Mining is a part of all cryptocurrencies and forms the root of trust in the currency. Typically, “miners” make money for mining, trading computing resources...


What to Do About C-Level Fraud Attacks

July 25, 2017 | By Todd O'Boyle

C-level fraud attacks are an increasingly common vector, especially for SMBs. Generally, these attacks come in the form of spoofed emails from the “CEO” or another C-suite exec (actually an attacker who has gained access to that email address or who is using a fake...


The Petya Ransomware Outbreak: What You Need to Know

June 27, 2017 | By Todd O'Boyle

Early on June 27, 2017, public systems in Eastern Europe began showing signs of the Petya ransomware outbreak. This quickly spread throughout mainland Europe, affecting global law firm DLA Piper and logistics company Maersk. There have been reports of outbreaks in the U.S., but none...