Cyberattack Lessons for Companies and People

I am going to list various events and their lessons that we “should” learn from(my weekend reading): Home Depot hack from KrebsonSecurity Nov7 post: 56 million emails were harvested as well as the 53 million credit card numbers. “Home Depot said the crooks initially broke in using credentials stolen from a third-party vendor. The company … Read more

Belkin N750 router has Zero-day exploit

This router has a big security hole:   Integrity Labs says there is a guest wifi Zero-day exploit, this means that an unportected (without a password) wifi zone can be attacked and the machine can be taken over by the hacker.   If you have a Belkin N750 you should consider replacing it ASAP. Believe … Read more

Malicious malware in BIOS again?

I say “again” because we have had BIOS malware before  the famous CIH (Chernobyl) virus from 1998. Sophos recount And the last time the Chernobyl virus activated (April 26th) it caused $250mil dollars of damage in 1999 for South Korea alone. Even Mac’s can have BIOS infections as from Trendmicro Blog post Intel and MITRE … Read more

Mac malware 356k apps infected

Palo Alto Networks has found a Mac malware targeting the OS and iOS systems. It is only thte second known malware family. It is the first known malware to automate generation of malicious iOS apps. It is the first to install in-the-wild malware on non-jail-broken iOS devices through enterprise And the following is the most … Read more

Encrypting Laptop Files: Legal effects

Interesting Defcon17 (an attorney gave a talk in this video): This Defcon presentation is all about Constitutional rights on your computers.   Also the following webpage  at Cnet.com   When one thinks someone want to read their laptop content, and then encrypt the data, that may not be enough to prevent the government whose border … Read more