Tag Archives: Brian Krebs

Anunak, Russian/Ukraine Bank Hackers

An ATM gang has stolen more than $15 million from Eastern European banks, To gain a foothold inside financial institutions, the “Anunak group” — sent bank employees targeted, malware-laced emails made to look like the missives were sent by Russian … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Anunak, Russian/Ukraine Bank Hackers

Hypercom of Scottsdale, Arizona’s Equinox Payments

Equinox is working with customers, distributors, and channel partners to replace the certificates to return terminals to an operational state after all payment terminals bricked themselves. Why? Because cryptographic certificates used in the devices has expired en masse. Many merchants … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hypercom of Scottsdale, Arizona’s Equinox Payments

Hey Bebe!

According to an article written by Brian Krebs, it sounds like Bebe is undergoing a credit/debit breach investigation. The data copied from the magnetic stripe on the backs of credit cards, which bad-guys can use to write to blank cards … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Hey Bebe!

There is no CyberSecurity?

60 Minutes has a video on cyberthieves stealing your credit card information. This is a must watch for everybody who has a debit/credit card; a must watch for every merchant and service provider. The 15 minute video talks of the … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on There is no CyberSecurity?

Should We Buy Credit Monitoring Services?

With the ton of breaches that have been happening, we use one of the credit monitoring services, after this year though and all the breaches going on, one of the first services that is offered to potential victims, is credit … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Should We Buy Credit Monitoring Services?

Bad Contractors

Even more of a reason to have a solid Third Party Assessment program within your organization. Not one, or two, but three Israeli defense contractors who built the Iron Dome missile defense system were compromised by hackers. How were they … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Bad Contractors

Hackers Target HVAC to Target Target

Here is a link to Krebs On Security in regards to how Target hackers broke in via an HVAC Company. I would be weary about phishing sites that contact you to sign up for credit monitoring, they could be… A … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Hackers Target HVAC to Target Target

The Value of a Hacked PC

Just to enlighten you what the value of a hacked PC is to a bad guy. From a Krebs security article

Posted in Security Blog | Tagged , , , | Comments Off on The Value of a Hacked PC