Tag Archives: 2015

770,000 Records From One of Australia’s Largest Travel Insurance Companies

Around the number of 770,000 records of personal information consisting of travel insurance clients, names, phone numbers, email addresses, travel dates and prices for policies was stolen around December 18th. Aussie Travel Cover notified 3rd party agents, but did not … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on 770,000 Records From One of Australia’s Largest Travel Insurance Companies

Beware Used or Discount Devices

Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Beware Used or Discount Devices

Hacker’s List

A new service is online where a person posts a problem to solve as a job and another person bids on the work if they know how to solve it. So far, most problems look to be in regards to: … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Hacker’s List

19,000 French Websites Either Defaced or DDoS’ed

Since the three day terror attack that started in France on January 7 with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers. Defacements had the message: ‘The Islamic State Stay … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on 19,000 French Websites Either Defaced or DDoS’ed

LinkedIn Phishing

There has been a lot of phishing emails claiming to be from LinkedIn Support, designed to fool recipients into giving up their login credentials. The email uses a lowercase I instead of a capital i when spelling ‘Linkedln’ I promote … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on LinkedIn Phishing

20150415 = Changes to CISSP Domains

Q: How is the CISSP exam changing? A: The CISSP exam is being updated to stay relevant amidst the changes occurring in the information security field. Refreshed technical content has been added to the Official (ISC)² CISSP CBK to reflect … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 20150415 = Changes to CISSP Domains

New Scam, Don’t Click Court Ordered Appearance Notification

Bad guys are sending emails claiming to come from a real law firm called ‘Baker & McKenzie’. The email states you are scheduled to appear in court and should click a link to view a copy of the court notice. … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on New Scam, Don’t Click Court Ordered Appearance Notification

Vulnerability Found in Certain AMD Processor

A vulnerability was found in AMD Processors that insufficiently protected code signatures and other errors in the firmware could be used by hackers to inject software, which could then be executed by the System Management Unit and Accelerated Processing Units. … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Vulnerability Found in Certain AMD Processor

Presidential Proposal List

As part in the President’s State of the Union address, Barack Obama is planning on: Insisting that companies reveal data breaches within 30 days Criminalizing the sale of botnets Criminalizing the sale of stolen U.S financial data The President’s twitter feed … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Presidential Proposal List

Non-Oracle sites offering Oracle ‘Fixes’/Malware

Oracle put out a press release, it reads: Warning It has come to our attention that there are non-Oracle sites offering Oracle ‘fixes’ for genuine Oracle error messages. You probably already don’t need to be told, however: Please do not … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Non-Oracle sites offering Oracle ‘Fixes’/Malware