Monthly Archives: August 2014

Banking CyberSecurity Infographic

Posted in Security Blog | Tagged , , , , | Comments Off on Banking CyberSecurity Infographic

2014 IBM Cyber Security Intelligence Infographic

Posted in Security Blog | Tagged , , , , , | Comments Off on 2014 IBM Cyber Security Intelligence Infographic

RFID Skimming

It’s from a few years back. Is this still a vulnerability? Do banks still issue RFID cards? You can still find RFID credit card readers, so I wonder.

Posted in Security Blog | Tagged , , , , | Comments Off on RFID Skimming

Ruby On Rails Security Thoughts

Security questions in the video start at 2:25 Like any other framework, the Rails app needs to be kept up to date. From time to time security issues are reported in the Rails app. Developers of Ruby applications should keep … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Ruby On Rails Security Thoughts

Mid-year 2014 Data Breaches Exposed

2014 is going to replace 2013 as the highest year on record for exposed records, according to Risk Based Security. Mid-year 2014 at a Glance … • There were 1331 incidents reported during the first six months of 2014 exposing … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Mid-year 2014 Data Breaches Exposed

SecurityNinjaTV DEFCON 22 Car Hacking with Charlie Miller & Chris Valasek

Posted in Security Blog | Tagged , , , , , , | Comments Off on SecurityNinjaTV DEFCON 22 Car Hacking with Charlie Miller & Chris Valasek

Spearphishing and Why Education and Awareness is Important

It was revealed yesterday that after an investigation by the Nuclear Regulatory Commission (NRC), which oversees the US nuclear power grid, three incidents uncovered that hackers were able to access internal documents. One of the hacking incidents, involved emails sent … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Spearphishing and Why Education and Awareness is Important

Site Access With Tor

My webhosting uses CloudFlare which adds a mitigating control when trying to access it with a Tor Browser. I actually didn’t know it did this. I host with bluehost

Posted in Security Blog | Tagged , , | Comments Off on Site Access With Tor

Searching the Deep Web – Infographic

Posted in Security Blog | Tagged , , , , | Comments Off on Searching the Deep Web – Infographic

Consumers Footing the Bill on Data Breaches

Found on this page I really love infographics and how they put things into perspective.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Consumers Footing the Bill on Data Breaches