Blog Stats
- 75,561 hits
Monthly Archives: September 2015
Don’t Be a Victim of Tech Support Scams
This year alone, an estimated 3.3 million people in the United States will pay more than $1.5 billion to scammers. Attorney General Bob Ferguson and experts from Microsoft explain how scammers pretending to help you with computer problems can steal … Continue reading
Posted in Security Blog
Tagged 2015, scam, scammers, scamming, Security Awareness, social engineering, vishing
Comments Off on Don’t Be a Victim of Tech Support Scams
19 Laws of Information Security
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading
Posted in Security Blog
Tagged 2015, Immutable Laws, information security, Information Technology Security Awareness, Security Awareness
Comments Off on 19 Laws of Information Security
How the Internet Blackmarket is Structured
The video above shows the mapping of how the blackmarket works. Research done @Google in collaboration with Berkeley, Databricks, UCSD, UCSB, George Mason University and Michigan State University.
Posted in Security Blog
Tagged black-market, blackmarket, research, spam, spammers
Comments Off on How the Internet Blackmarket is Structured
Volkswagen Hack
In the traditional meaning of the word hack, there are some half-million diesel powered Volkswagens out that have the capability to detect when they are hooked up to an emissions computer and switch modes to ‘burn clean’, which are normally … Continue reading
Remember Galen Marsh?
I wrote about Galen Marsh as the guy who posted the information of 900 clients on PasteBin with promises that he had a LOT more to sell. Roughly the private information on 730,000 Morgan Stanley clients. There was rumor that … Continue reading
The Internet of Shit
There are so many things that are spawning with Internet of Things technology. Internet connected everything! Most devices spy on us… What happens when devices learn they can blackmail us? The Internet of Shit’s Twitter presence is one to follow.
Posted in Security Blog
Tagged 2015, blackmail, Internet of Things, privacy, twitter
Comments Off on The Internet of Shit
CVS Photo – Data Breach
Credit card information collected by the independent vendor who manages and hosts CVSPhoto.com may have been compromised, and customer registrations related to online photo processing and CVSPhoto.com are completely separate from CVS.com and the pharmacies. Financial transactions on CVS.com and … Continue reading
Posted in Security Blog
Tagged 2015, breach, credit card, data breaches, third party, Third Party Assessments
Comments Off on CVS Photo – Data Breach
Infographic on Data Breaches
Posted in Security Blog
Tagged 2015, breach, data breaches, infographic
Comments Off on Infographic on Data Breaches
Excellus Healthcare (Blue Cross Blue Shield) Data Breach
Attackers may have gained access to Excellus clients’ names, dates of birth, Social Security numbers, mailing addresses, telephone numbers, member identification numbers, financial account information and claim information as indicators of compromise goes back to 2013. Excellus has a client … Continue reading
Posted in Security Blog
Tagged 2015, blue cross blue shield, breaches, data breaches, excellus, ponemon
Comments Off on Excellus Healthcare (Blue Cross Blue Shield) Data Breach
Ashley Madison Users Don’t Know Password Security
It took about 10 days to crack over 11 million passwords of Ashley Madison subscribers/users. Here are some of the worst ones…
Posted in Security Blog
Tagged 2015, password, password cracking, passwords, privacy
Comments Off on Ashley Madison Users Don’t Know Password Security