Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Dec 10, 2018

The holiday shopping season is upon us.

Guy on Phone - Blog Image 2018.jpg

‘Tis the season to exercise our rights as consumers to spur the economy while satisfying innate needs to acquires goods and services. Unfortunately, cyber thieves are also counting on this and the inevitable holes in the network security infrastructure of your favorite shopping outlet.

Holiday Spending is Higher Than Ever

The National Retail Federation is projecting that:

“Consumers say they will spend an average of $1,007.24 during the holiday season this year, up 4.1 percent from the $967.13 they said they would spend last year, according to the annual survey released today by the National Retail Federation and Prosper Insights & Analytics.

“The holidays are just around the corner and consumers are ready to shop,” NRF President and CEO Matthew Shay said. “Confidence is near an all-time high, unemployment is the lowest we’ve seen in decades and take-home wages are up. All of that is reflected in consumers’ buying plans. Retailers expect strong demand this year, and are prepared with a wide array of merchandise while offering strong deals and promotions during the busiest and most competitive shopping season of the year.”

Shopping Isn’t Always Safe

Unfortunately, despite this optimism, Denis Green and Mary Hanbury reported in Business Insider in an article titled “If you shopped at these 16 stores in the last year, your data might have been stolen” the names and nature of specific store data breaches in the last 24 months.

Holiday Scams and Malware Campaigns

The United States Computer Emergency Readiness Team (US-CERT) “reminds users to remain vigilant when browsing or shopping online this holiday season. Emails and ecards from unknown senders may contain malicious links. Fake advertisements or shipping notifications may deliver attachments infected with malware. Spoofed email messages and phony posts on social networking sites may request support for fraudulent causes.

To avoid seasonal campaigns that could result in security breaches, identity theft, or financial loss, users are encouraged to take the following actions:

  • Avoid following unsolicited links or downloading attachments from unknown sources.
  • Visit the Federal Trade Commission's Consumer Information page on Charity Scams.”

Protect Your Content and Customers

Ensure cyber treat prevention with a signature-less engine that searches for hidden opcode instructions inside data files, regardless of code flow (encrypted, encoded) or size. The engine should also analyze active content (e.g. Microsoft Office macros, embedded JavaScript) through next-gen de-obfuscation capabilities and an advanced set of heuristics to reveal malicious files.

Want more great articles like this?Subscribe to our blog.

Get all the latest news, tips and articles delivered right to your inbox

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Dec 10, 2018

You may also like:

Cybersecurity Myths Revisited

How many times have you come to accept a…

How many times have you come to accept a certain “trut… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Nov 21, 2018

Cyberthreats Cost More Than You Think

The costs of attacks are rising at an al…

The costs of attacks are rising at an alarming rate. We've … Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Nov 21, 2018

Static vs. Behavior Cyberthreat Analysis: A Closer Look

You have a choice in cyberthreat protect…

You have a choice in cyberthreat protection. At the core of… Read More >

Boris Vaynberg

by Boris Vaynberg

VP and GM for Advanced Threat Detection

Posted Nov 06, 2018