Study: Cybercrime Up 19% USA

The New Ponemon study (sponsored by HP) http://www8.hp.com/us/en/software-solutions/ponemon-cyber-security-report/index.html?jumpid=va_rmaig2786p Global Study at a Glance 252 companies in 7 countries 2,128 interviews with company personnel 1,928 total attacks used to measure total cost $7.7 million is the average annualized cost 1.9 percent net increase over the past year 15 percent average ROI for 7 security technologies Even … Read more

Why Cybersecurity problems?

To answer why Cybersecurity? we must discuss how software is being developed. There are traditional software methods (also called waterfall) from  the following site: http://www.umsl.edu/~hugheyd/is6840/waterfall.html I always like to break down waterfall in the following: Pseudocode Design Develop Test Customer has it – needs any bug fixes must be fixed. Did you notice a lack of … Read more

You Don’t Understand Hackers or Computers? Hackers Will Still Hack You

Yes we(humans) are Risk seeking  with losses, and risk averse with gains. https://www.schneier.com/essays/archives/2008/01/the_psychology_of_se.html “Security is a tradeoff,” Schneier said, speaking to a packed audience at his RSA session. “What are you getting for what you’re giving up? Whether you make that tradeoff consciously or not, there is one.” You think that your computers are not … Read more

Digital Anything is at Risk – Fingerprints & more

Office Personnel Managment hack now suspected also of stealing fingerprint data. http://www.nationaljournal.com/tech/2015/07/14/How-Much-Damage-Can-OPM-Hackers-Do-With-Million-Fingerprints   What can be done with a stolen fingerprint?  Is it really only a foreign government coup?  Can the Chinese government splinter groups use this information for other nefarious reasons? { Part of the worry, cy­ber­se­cur­ity ex­perts say, is that fin­ger­prints are part of … Read more

Why is Security Difficult? Target Breach Analysis 2 Yrs Later

Brian Krebs does a great job reviewing the details at his latest post http://krebsonsecurity.com/2015/09/inside-target-corp-days-after-2013-breach/#more-32276 The analysis of Target’s breach is obvious in the level of insecurity in Target 2012. Default passwords used Passwords of insufficient complexity No segmentation of network. Insufficient patching No pentesting Every point in the PCI (Payment Card Industry) was a failure. … Read more