Tag Archives: 2014

An Introduction to Cyber Security

The Open University Presents: An Introduction to Cyber Security, which starts on October 13th, so register now! This free online course will help you to understand online security and start to protect your digital life, whether at home or work. … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on An Introduction to Cyber Security

Tabnabbing Attacks

The dangers of having too many tabs open. How The Attack Works A user navigates to your normal looking site. You detect when the page has lost its focus and hasn’t been interacted with for a while. Replace the favicon … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Tabnabbing Attacks

Goodwill/C&K Systems

Back when I posted about the 868,000 Payment Cards, 330 Stores, it was recently revealed that the exposure was due to C&K Systems. All 20 previously affected Goodwill members have stopped using C&K Systems to process customers’ payment cards… Earlier … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Goodwill/C&K Systems

Gmail Passwords Posted

4929090 gmail email addresses and passwords were posted online as a result of phishing and weak website database compromise. This site can be used to check to see if your email address is on the list. Regardless if your email … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Gmail Passwords Posted

Home Depot Breach

Home improvement retailer Home Depot confirms its payment security systems fell victim to a massive cyber attack, possibly since April, at nearly 2,200 stores in the U.S. and Canada. Fishnet Security, Symantec, and the Secret Service are working to research … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Home Depot Breach

Cyber Risk & Internet of Things

I made this video for work, but modified it a bit so it’s not directly work related, but I didn’t edit the audio… Don’t hate! It’s my first one. The intended audience is for those who don’t think with a … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Cyber Risk & Internet of Things

Fake Cell Phone Towers & CryptoPhone

Seventeen fake cellphone towers were discovered across the U.S. last week. They were discovered by using the CryptoPhone, an Android-based secure mobile phone with 360° mobile device security for secure messaging and voice over IP communication on any network. “What … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Fake Cell Phone Towers & CryptoPhone

868,000 Payment Cards, 330 Stores

Goodwill’s investigation revealed that malware had been installed on a third-party vendor system used by 10% of its franchised stores to process credit cards. Twenty of Goodwill’s 158 regional headquarters in the United States were impacted by the breach, because … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on 868,000 Payment Cards, 330 Stores

Nude Celebs (The Fappening) !!! and Password Recovery

Nude Jennifer Lawrence… Sorta. Apple says that the mass theft of nude celebrity photos (Dubbed, the Fappening) that were released over the weekend did not occur because of a breach in any Apple systems, including iCloud. Apple also says that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Nude Celebs (The Fappening) !!! and Password Recovery

Should We Buy Credit Monitoring Services?

With the ton of breaches that have been happening, we use one of the credit monitoring services, after this year though and all the breaches going on, one of the first services that is offered to potential victims, is credit … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Should We Buy Credit Monitoring Services?