Starbucks Mobileapp Did not get hacked – user accounts got hacked

And this issue even though being a “new news story” as of 6 hours ago from ibtimes.cp.uk http://www.ibtimes.co.uk/starbucks-customer-accounts-hacked-through-smartphone-apps-1501118 Which originally got going with Bob Sullivan’s ‘scoop’     yes there is no need to know the account number, because all that is needed is the username, which is not the account number.  I have a … Read more

We Guarantee 100% Security: Don’t Use Computers, Don’t do Anything

Of course you could also disconnect your computer from the Internet. Here is your computer disconnected from Internet: But even disconnected from Internet a virus can still enter your computer (airnet). This is  where a computer can get a virus from a flashdrive.  Stuxnet was transmitted by usb flash drives, several infected flash drives were … Read more

More WordPress Plugin Weakness-Vulnerability

Sucuri blog has the detailed information: https://blog.sucuri.net/2015/05/jetpack-and-twentyfifteen-vulnerable-to-dom-based-xss.html   In short, the plugins Jetpack and TwentyFifteen had a bad file which could be attacked by a XSS(Cross Site Scripting) method.   As Sucuri blog mentions the attack is actually DOM(Domain Object Model)-based XSS, which even a WAF(Web Application Firewall) cannot see this. Of course it has to … Read more

Ransomware: Scourge of Cybersecurity

Ransomware is a scourge of evil – turning all of your data useless. from NetworkWorld  Unfortunately this is a typical message(which are getting more sophisticated – attackers are allowing one file to be decrypted)   Here is a Cryptolocker 2.0 message     Fortunately not all ransomware actually works as prescribed. Here are just a … Read more

Security Industry: One Dimensional, Limited by Experience

If you ask me the President of RSA had the best keynote at the RSA conference in San Francisco: http://www.rsaconference.com/media/escaping-securitys-dark-ages I have collected the images from the video link above: Talk was titled ” We are Living in Security’s Dark Ages” There is a lot in the 30 minute video, I recommend that if you … Read more