If a Firewall is Useless What to Do?

As I was scanning the Internet for interesting relevant articles this is the one I thought was unique in discussing a fundamental issue of our time(in 2015) http://www.infoworld.com/article/2616931/firewall-software/why-you-don-t-need-a-firewall.html Plus Roger Grimes discusses buffer overflows. { For nearly three decades, remote buffer overflows were the most dreaded tool in the hacker’s arsenal. Simply find an open … Read more

Courts Uphold FTC Regulation-Punishment to Negligent Company

Threatpost has the story:  https://threatpost.com/court-rules-ftc-has-authority-to-punish-wyndham-over-breaches/114390 From the court brief http://www2.ca3.uscourts.gov/opinarch/143514p.pdf are some interesting snippets:   Let’s list the cybersecurity problems that Wyndham had: Stored CC data (which is a violation of PCI standard) Passwords were simple (Example: “micros” in a Micros computer default pw) Did not use firewalls between their corporate network, property management system, … Read more

Ashley Madison Hack Proves CyberSecurity Must Be Six Sigma Secure

We have to continue “learning” from high profile hacks. As you may have read in the news a “dating” site that attracts extra marital hookups has been hacked by some hackers. The after action report in detail has not been released so nothing really to learn from the hacking itself. Except the usual – I … Read more

Patching Ur Computers – Actually Reduces Risk

Patch Tuesday  August ( 8/11/2015) Here is Microsoft patch Tuesday August 2015 edition https://technet.microsoft.com/en-us/library/security/ms15-aug.aspx   How can I say that unpatched computers will get hacked? Any Metasploit pentester will tell you this. Metasploit is a nifty program (runs on Linux) that will attack computers with various attacks and payloads. It takes advantage of people who … Read more