Tag Archives: malware

Staples Follow-Up

Back in October, it was announced that banks were investigating Staples based on fraudulent card activity. Staples’ data security experts detected that criminals deployed malware to some point-of-sale systems at 115 of its more than 1,400 U.S. retail stores. Upon … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Staples Follow-Up

Mad Rambo is Mad… At the Sony Pictures Hack!

Sony pictures was breached and several movies were leaked. Movies like Fury, Annie, etc, have been found on torrent download sites. It’s believed to be tied to North Korea and a Sony movie making fun of, and the assassination of, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Mad Rambo is Mad… At the Sony Pictures Hack!

Hey Bebe!

According to an article written by Brian Krebs, it sounds like Bebe is undergoing a credit/debit breach investigation. The data copied from the magnetic stripe on the backs of credit cards, which bad-guys can use to write to blank cards … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Hey Bebe!

Chinese Made eCigarette USB Malware Phones Home

It was found that some Chinese made eCigarettes and their USB charging cables, have been made with malware built right in. When plugged into a computer, it phoned home. Is this a true story or a hoax? Hard to tell … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Chinese Made eCigarette USB Malware Phones Home

CryptoWall and Dickson County Sheriff’s Office

Sheriff’s department of The Dickson County, Tennessee was attacked by a Ransomware trojan ware that encrypts all of the files on the system and can be decrypted only (HA, yeah right!) if the ransom has been paid for them to … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on CryptoWall and Dickson County Sheriff’s Office

Tales from the Encrypt (RSA Video)

Happy Halloween!

Posted in Security Blog | Tagged , , , , , , | Comments Off on Tales from the Encrypt (RSA Video)

Breaches, Attacks, and Vulnerabilities in October 2014

This might be the longest one I’ve done so far: List of data breaches and cyber attacks in October http://t.co/AtYQ3vBJEa — Lewis Morgan (@LewisMorgan_) October 28, 2014 Payment information breach Dairy Queen Data breach hits 395 stores ‘Big K’ raided … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Breaches, Attacks, and Vulnerabilities in October 2014

Staples Investigation

From Krebs on Security According to more than a half-dozen sources at banks operating on the East Coast, it appears likely that fraudsters have succeeded in stealing customer card data from some subset of Staples locations. It may have been … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Staples Investigation

How Tyupkin, the ATM Malware, Works

The hack, known as Tyupkin, requires criminals to enter a unique code into a machine that has already been compromised by the malware. A second Pin code – a random sequence of numbers generated at another location – is also … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on How Tyupkin, the ATM Malware, Works

SandWorm

On Tuesday, October 14, 2014, iSIGHT Partners – in close collaboration with Microsoft – announced the discovery of a zero-day vulnerability impacting all supported versions of Microsoft Windows and Windows Server 2008 and 2012. Microsoft has patched this vulnerability in … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on SandWorm