Tag Archives: 2016

Did you hear about the FDIC data breach?

Thanks to DLP (data loss prevention) software, the FDIC caught 44,000 customer records getting copied to a USB drive on an employee’s last day of work. She legitimately used the customer records normally as part of her day-to-day and while … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Did you hear about the FDIC data breach?

MedStar Health

It’s assumed that MedStar Health is a victim of crypto-ransomware as MedStar forced a shutdown of their email and records database yesterday in order to stop the spread of the malware from encrypting more systems. Most operations went back to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on MedStar Health

Wireless Mice Leave Corporate Networks Vulnerable To Attack

Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack

Verizon Breached. Check!

Creator of the infamous Data Breach Investigations Report has themselves been breached. Contacted about the posting, Verizon Enterprise told KrebsOnSecurity that the company recently identified a security  flaw in its site that permitted hackers to steal customer contact information, and that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Verizon Breached. Check!

USB Compromise Reveals 22,000 ISIS Identities

A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Compromise Reveals 22,000 ISIS Identities

IRS and Seagate?

The Internal Revenue Service issued an alert on March 1st, 2016, to payroll and human resources professionals to be aware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on IRS and Seagate?

KBB Car Hacking Survey Results

Kelley Blue Book performed a survey that they revealed at RSAC 2016 regarding vehicle vulnerabilities and even though 2015 was the year that the public really started learning about car hacking. Since the last big media news blast, awareness on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on KBB Car Hacking Survey Results

Nissan Leaf API has NO SECURITY

Is it hacking if there is no security by design? If the doors on a bank are unlocked, is it breaking and entering? The API (application program interface) for the Nissan Leaf was found to be vulnerable. How vulnerable? Well, … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Nissan Leaf API has NO SECURITY

Going Rogue with PoS

This picture is making it’s way across the Internet. A point of sale machine that will use touch enabled pay credit/debit cards. It’s probably time for an RFID wallet.

Posted in Security Blog | Tagged , , , | Comments Off on Going Rogue with PoS

A Letter From Tim Cook at Apple

Below is a letter from Tim Cook of Apple. February 16, 2016 A Message to Our Customers The United States government has demanded that Apple take an unprecedented step which threatens the security of our customers. We oppose this order, … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on A Letter From Tim Cook at Apple