Tag Archives: 2016

360,213,024 Users Credentials… From MySpace?

If you re-use passwords and haven’t changed your login credentials from back when you used your MySpace page 10 years ago, then you are at risk! The login details of more than 360,213,024 MySpace accounts have been leaked on the … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on 360,213,024 Users Credentials… From MySpace?

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

60% of BYOD Users Use the Same Device to Download Pirated Content

In a recent poll in the UK, sixty percent of users who use their personal device for accessing corporate data, also use the exact same device to download pirated content off of ‘bad sites’ that are usually laden with nudity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on 60% of BYOD Users Use the Same Device to Download Pirated Content

Smart Farming Vulnerabilities

Smart farming is a real thing, it enables farmers to monitor their crops and gather visual analytics on big data. This allows for farmers to anticipate crop availability and forecast pricing. This data is very valuable to the farmers and costly … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Smart Farming Vulnerabilities

PCI DSS Version 3.2

PCI DSS 3.2 is officially published Here is the summary: Multi-factor authentication will be required for all administrative access into the cardholder data environment. The “Designated Entities Supplemental Validation” (DESV) – a set of steps that tell an entity how they can … Continue reading

Posted in Security Blog | Tagged , | Comments Off on PCI DSS Version 3.2

SNOWDEN

There are a lot of mixed feelings regarding the Edward Snowden on social networks I frequent.

Posted in Security Blog | Tagged , , , , , , | Comments Off on SNOWDEN

Phishing Outlook Looks Legitimate

When an attacker is using Microsoft Office 365’s Outlook paired with Microsoft Lync, it makes phishing emails look authentic and harder to detect without really checking it out. See graphic below.

Posted in Security Blog | Tagged , , , , , | Comments Off on Phishing Outlook Looks Legitimate

Eating 20% Fat Beef or 80% Lean Beef… A Google Android Problem

You know, it’s really how you frame something to make it sound almost appealing. Lots of grocery stores sell beef and it’s labeled as lean, but you know it has a lot of fat content if you were to flip … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Eating 20% Fat Beef or 80% Lean Beef… A Google Android Problem

2016 = 2015 + 10%… In Breaches!

The Identity Theft Resource Center reports that there has been a total of 269 data breaches recorded through April 19, 2016, and that more than 11.27 million records have been exposed since the beginning of the year. A data breach … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on 2016 = 2015 + 10%… In Breaches!