Was breach at Target internal or a vendor?

X-force has information on the specific malware that breached the Point of Sale terminals (POS).

The Internet Storm Center has an interesting comment,which is discussed in their newssummary section.

Is a refrigeration vendor ultimately to blame for the target breach?

This brings up another point – your vendors better have good security, as the weakest link in the chain breaks and allows the criminals in.

Are all viruses detectable with AntiVirus?

If all viruses were detectable with antivirus then malware would be easily found and no more hacks would happen.

Some viruses are hard to detect on purpose. They evade antivirus software, system administrators and other software.

But a scan of a system will show a port open which requires further analysis. Because the virus or malware wants to phone home, well it has to have a port open to do that.

Now we can find it: with  Sigma

or Alpha

Web application testing Methods start with Alpha

What is the first method used in evaluating a web application?

It starts with the Alpha test

How do you know the level of security with your website application?

1. A certain amount of testing must be started – our Alpha testing starts a security profile.

2. A Second level of testing is the Sigma (Σ) testing – which actually attempts to break the application.

In real estate  the motto is Location, Location, Location.

But in Information Security  it is Testing, Testing, Testing.