Why is Security Difficult? Target Breach Analysis 2 Yrs Later

Brian Krebs does a great job reviewing the details at his latest post http://krebsonsecurity.com/2015/09/inside-target-corp-days-after-2013-breach/#more-32276 The analysis of Target’s breach is obvious in the level of insecurity in Target 2012. Default passwords used Passwords of insufficient complexity No segmentation of network. Insufficient patching No pentesting Every point in the PCI (Payment Card Industry) was a failure. … Read more

FTC-Wyndham Court Decisions Make Cybersecurity More Litigiou$

The latest story from Arstechnica: http://arstechnica.com/tech-policy/2015/08/ftc-can-sue-companies-with-poor-information-security-appeals-court-says/ Builds on the previous post: http://oversitesentry.com/courts-uphold-ftc-regulation-punishment-to-negligent-company/ Higher regulation –> higher lawsuit fees –>  More costs to a breach. Wyndham had ineffective Cybersecurity and FTC ruled was negligent in its IT practices.  But Wyndham thought it could sue the FTC since Wyndham thought FTC was pushing it’s boundaries as far as … Read more

Hackers Steal What You Allow

To anyone that pays attention Chinese hackers steal IP (Intellectual Property Theft) http://www.infosecurity-magazine.com/news/chinas-ip-theft-tech-transfer/ We can argue – is it $5trillion? or 3? My point is it does not matter, the Chinese steal what they can they are not picky. There are certain high value targets of course, but if you allow a hacker in your … Read more

Remove Windows Snooping Privacy Patches

The “Spy patches” from Microsoft should be uninstalled from your environment. One reason is the constant network bandwidth to Microsoft servers they generate. Second, they are not a “security” patch, in general any patch that includes more functionality is bad for security.   Winaero Blog post first noticed them in Win7 and Win8  by Sergey … Read more

Is the Router the Weak Link?

New Cisco attacks on the IOS operating system (a Cisco operating system). http://tools.cisco.com/security/center/viewAlert.x?alertId=40411 There are actually no product vulnerabilities, but just plain old administrative access problems. What happens if someone gets your admin account on the router? The hacker will not change routes so you fix it, the hacker will upload a hacker special malware … Read more