Blog Stats
- 75,561 hits
Monthly Archives: February 2015
NSA Wants Access to Encrypted Data Too!
The director of the U.S. National Security Agency, Michael Rogers, wants access to encrypted data on computers and other devices. He’s working on developing a framework that will enhance investigations. This functionality should be enabled by software manufacturers, but hopefully … Continue reading
Posted in Security Blog
Tagged 2015, Access Control, encryption, framework, NSA
Comments Off on NSA Wants Access to Encrypted Data Too!
China Bans Security, or Wants to
China’s new counter terrorism law will require technology firms to hand over encryption keys and install security “backdoors”. Once source says “You are no longer allowed a VPN that’s secure, you are no longer able to transmit financials securely, or … Continue reading
Posted in Security Blog
Tagged 2015, China, counter terrorism, law
Comments Off on China Bans Security, or Wants to
Net Neutrality Wins
The FCC has adopted net neutrality effectively banning “throttling”!
Your Life Online After you Die
Posted in Security Blog
Tagged 2015, online, Security Awareness
Comments Off on Your Life Online After you Die
Gemalto and the Great Sim Encryption Key Theft
Edward Snowden leaked via the Intercept, The National Security Agency (NSA) and the Government Communications Headquarters (GCHQ) jointly hacked into the internal network of the largest Subscriber Identity Module (SIM) card creator and manufacturer, who also puts the chips into … Continue reading
Posted in Security Blog
Tagged 2015, breach, encryption keys, gchq, gemalto, NSA, sim cards
Comments Off on Gemalto and the Great Sim Encryption Key Theft
Identity Theft, of the Children
Imagine getting credit card bills and hospital bills for your children, yet they are very young and barely in school yet. This is what is happening to children throughout the United States, and will continue to happen by the millions. Since … Continue reading
Posted in Security Blog
Tagged 2015, Anthem, Identity Theft, privacy, Security Awareness
Comments Off on Identity Theft, of the Children
Lenovo Superfish
Superfish is pre-installed Lenovo adware (thanks Lenovo!), which is meant to place advertisements in your web browser. The problem is that the software also intercepts encrypted traffic, which opens up your computer to man-in-the-middle attacks. Superfish intercepts HTTPS connections. Security … Continue reading
Posted in Security Blog
Tagged 2015, adware, certificate management, certificates, https, lenovo, man-in-the-middle, mitm, verisign
Comments Off on Lenovo Superfish
Kapersky Reports Increase in Phishing
Kaspersky recently reported that 28.8 percent of phishing attacks in 2014 tried to steal financial data from consumers. Information as of late, that has been getting stolen, WILL be used in more phishing attacks in 2015. Here is a snippet from … Continue reading
Posted in Security Blog
Tagged 2014, 2015, phishing, Security Awareness
Comments Off on Kapersky Reports Increase in Phishing
Survey Says 80% of Security Risks are Users
Bromium surveyed 100 security professionals to see what they thought their biggest security risk was. Through my own research, I have found that the best way to give security awareness training, is NOT this way, with one time security awareness … Continue reading
Posted in Security Blog
Tagged 2015, compliance, Information Technology Security Awareness, risk, Security Awareness
Comments Off on Survey Says 80% of Security Risks are Users
The Equation Group
Possibly around 1996, but more actively in 2001, the Equation Group has been doing some really hardcore hacking on targets throughout the world. Their methods are far up the supply chain, as they would intercept and infect CDs and other … Continue reading
Posted in Security Blog
Tagged Cyber espionage, Equation Group, espionage, kapersky, NSA
Comments Off on The Equation Group