November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,638 hits
Tag Archives: 2015
The Internet of Shit
There are so many things that are spawning with Internet of Things technology. Internet connected everything! Most devices spy on us… What happens when devices learn they can blackmail us? The Internet of Shit’s Twitter presence is one to follow.
Posted in Security Blog
Tagged 2015, blackmail, Internet of Things, privacy, twitter
Comments Off on The Internet of Shit
CVS Photo – Data Breach
Credit card information collected by the independent vendor who manages and hosts CVSPhoto.com may have been compromised, and customer registrations related to online photo processing and CVSPhoto.com are completely separate from CVS.com and the pharmacies. Financial transactions on CVS.com and … Continue reading
Posted in Security Blog
Tagged 2015, breach, credit card, data breaches, third party, Third Party Assessments
Comments Off on CVS Photo – Data Breach
Infographic on Data Breaches
Posted in Security Blog
Tagged 2015, breach, data breaches, infographic
Comments Off on Infographic on Data Breaches
Excellus Healthcare (Blue Cross Blue Shield) Data Breach
Attackers may have gained access to Excellus clients’ names, dates of birth, Social Security numbers, mailing addresses, telephone numbers, member identification numbers, financial account information and claim information as indicators of compromise goes back to 2013. Excellus has a client … Continue reading
Posted in Security Blog
Tagged 2015, blue cross blue shield, breaches, data breaches, excellus, ponemon
Comments Off on Excellus Healthcare (Blue Cross Blue Shield) Data Breach
Ashley Madison Users Don’t Know Password Security
It took about 10 days to crack over 11 million passwords of Ashley Madison subscribers/users. Here are some of the worst ones…
Posted in Security Blog
Tagged 2015, password, password cracking, passwords, privacy
Comments Off on Ashley Madison Users Don’t Know Password Security
Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading
Posted in Security Blog
Tagged 2015, APT, command and control, phishing, satellite, social engineering, Turla, watering hole
Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
Vehicle Automation Susceptible to DoS Attacks
Self driving cars are pretty darn cool, but so are cybersecurity attacks against them. Like stopping them in their tracks with a laser pointer. No kidding! Security researcher, Dr. Jonathan Petit, (English version of little john… lol) points out the … Continue reading
Posted in Security Blog
Tagged 2015, car hacking, cyber risk, driverless cars, hacking, jonathan petit, lidar
Comments Off on Vehicle Automation Susceptible to DoS Attacks
1st Half of 2015’s Data Breaches – Infographic
Here are some awesomely shocking numbers related to data breaches of 2015s 1st half of the year. Get the report here.
Posted in Security Blog
Tagged 2015, breaches, data breaches, gemalto, infographic
Comments Off on 1st Half of 2015’s Data Breaches – Infographic
Here’s Why Physical Security Walkthroughs Are a Great Test
If you act like you belong, it’s not often you get questioned about your actions. This has been proven time and time again at many places with a lot of turnaround. This has especially worked well for a recent Walmart … Continue reading
Posted in Security Blog
Tagged 2015, fraud, Physical Security, Security Awareness, social engineering
Comments Off on Here’s Why Physical Security Walkthroughs Are a Great Test
Security Awareness Training Evolution
The lesson here, is that you shouldn’t make security awareness training; dull, boring, and strictly compliance based. Keep it: Fun Fresh Measurable
Posted in Security Blog
Tagged 2015, phishing, Security Awareness
Comments Off on Security Awareness Training Evolution