Email at Yahoo? You were hacked! Will be Phished!!

Yes we know yahoo had millions of email addresses hacked or rather the email address password database was stolen by an ingenious hacker.   Also according to this story(TechCrunch) the full disclosure over several years is 1 Billion email addresses and passwords were stolen Updated 3/14  later in day:  also keep in mind if you … Read more

Criminal Ransomware Marketing Campaign Makes it Easy

Krebs On Security has a scoop his Blog Post one slick professional video advertisement for selling Ransomware technology. (Above images are from a video Brian Krebs found that shows off Ransomware software you can purchase) In case you were wondering what it takes to create Ransomware, the video that Brian Krebs found makes it obvious that … Read more

What Cybersecurity Methods to Use?

A lot of Cybersecurity was discussed at RSA Conference videos this year. Let’s start with Global Healthsecurity Roadmap: Notice the major vendors being used by many an Enterprise for different parts of the architecture: Including Network, App/Data, IAM(Infrastructure Access Management), Endpoint, and monitoring/analysis Or about NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, and Recover. Of course … Read more

RSA Conference 2017 Notes

Yes many videos from RSA Conference in San Francisco, also Twitter posts with hashtags:  #RSAC2017, #RSAC, and #rsaconference So these are my Cybersecurity focused thoughts on RSA conference ending today(02/17/17): Top 7 new attack vectors (from SANS team youtube): Ransomware IoT as attack platform Ransomware on IoT ICS attacks more sophisticated random number generators cause … Read more

Start Your Compliance with Minimum Standards

If we had to start somewhere in computer security (or Cybersecurity) what should be done? First: start with performing minimum compliance standards (this objective also doubles as a documentation of compliance) Second:  Improve security by spending some time on Cybersecurity (an ounce of prevention is worth a pound of cure) Third: Integrate Governance Risk Compliance … Read more