Tag Archives: 2014

Staples Follow-Up

Back in October, it was announced that banks were investigating Staples based on fraudulent card activity. Staples’ data security experts detected that criminals deployed malware to some point-of-sale systems at 115 of its more than 1,400 U.S. retail stores. Upon … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Staples Follow-Up

ICANN Targeted in Spear Phishing Attack

Internet Corporation for Assigned Names and Numbers have announced that their system were compromised by a phishing attack. Some of the staff of ICANN fell victim to a spear phishing attack. From their website: ICANN is investigating a recent intrusion … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on ICANN Targeted in Spear Phishing Attack

PCI Professional Certification

I got my PCI Professional Certification today.

Posted in Security Blog | Tagged , , , , | Comments Off on PCI Professional Certification

8 Videos on Strategic Planning Management

It’s easy to forget some of the basics that I don’t deal with every day. Erica gives a great review without getting too deep into it all. Erica Olsen seems to know her stuff.

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 8 Videos on Strategic Planning Management

20 Bucks Buys You 1,000 Node Bot Army

According to the Dell SecureWorks report, for $20 you can purchase a small bot army of 1,000 computers. Findings in the deep web also include that the there is excellent customer service! Master those basics people and you will gain … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 20 Bucks Buys You 1,000 Node Bot Army

It’s THAT Time of Year

The year end is the time to start giving predictions of how next year will roll. Here are a few reports that have already been published (they all open in a new tab): WebSense Trend Micro Tech Republic CSO Online … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on It’s THAT Time of Year

Honeywell Point-of-Sale Systems Buffer Overflow Vulnerability

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Honeywell OPOS Suite. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Honeywell Point-of-Sale Systems Buffer Overflow Vulnerability

Iran vs. Las Vegas Sands

You may have heard that Las Vegas Sands was hacked recently, but it happened nearly a year ago on February 10th of 2014. PCs and Servers were getting shut down and their hard drives started to erase. The phone lines … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Iran vs. Las Vegas Sands

Hypercom of Scottsdale, Arizona’s Equinox Payments

Equinox is working with customers, distributors, and channel partners to replace the certificates to return terminals to an operational state after all payment terminals bricked themselves. Why? Because cryptographic certificates used in the devices has expired en masse. Many merchants … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hypercom of Scottsdale, Arizona’s Equinox Payments

Iowa Might Go Walletless

With Google Wallet and Apple Pay starting to take off, Geico putting your insurance on an app on your phone with digital ID cards, the only thing left for wallets is the driver’s license. Well, that too may go digital. … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Iowa Might Go Walletless