FireEye new report -APT28 coming from Russian government

FireEye report and what is in it: This report says what we knew – a major attack vector is coming from Russia. Russia  is attacking us and others  (East European interests) the first takeaway is the very targeted nature of an attack on the Georgian journalist covering the Caucasus. The email claimed to originate from … Read more

Staples now investigating breach

Brian Krebs broke the story again, since he reviews the bank fraud channels, as well as the crook channels in Russia and elsewhere at times. Tripwire  has a good video that explains how the cards are sold – it is a company which creates many IT security products. I have used Tripwire  File Integrity and … Read more

False Positives Bane of ITSecurity

Internet Storm Center discusses the month of CSAM false positives: ” The HUGE problem with this is false positives and false negatives.” Fortinet Blog post discusses the pressure on IT decision makers Wired story has Gonen Fink, the CEO of LightCyber, writing about how we need better products reviewing the false positives (a false positive is … Read more

Anti-Malware diligence or Cryptowall 2.0 file destruction

A customer handed me a computer that was infected with Cryptowall 2.0 With this message: I cleaned the computer of the virus portion of the problem, but unfortunately as on many sites explaining this issue: http://www.bleepingcomputer.com/forums/t/552103/updated-cryptowall-20-ransomware-released-that-makes-it-harder-to-recover-files/   In the several guides on the Net, the best one in my opinion is this one: http://www.bleepingcomputer.com/virus-removal/cryptowall-ransomware-information   I … Read more

New Vulnerabilities in SSL v3

OpenSSL is an open source toolkit that implements the Secure Socket Layer protocol either v2 or v3, it also runs Transport Layer Security (TLS v1) protocols   So when The Register writes that Google found Poodle (Padding Oracle On Downgraded Legacy Encryption) flaw in the protocol this shows sometimes the problem of  using security technologies. … Read more