Android Malware – iBanking steals passwords

This is a typical example how malware authors make money. They sell their programs and have other people make the attacks on you. RSA blogs has the story  – RSA is a security division of EMC company which has security encryption RSA was one of the first practicable public-key cryptosystems and is widely used for … Read more

Gang of hackers infiltrated Navy, other government and AT&T Uverse

A gang of 3 hackers were caught and have now been charged with conspiring to hack government computers. A Wired story discusses the different hacks that occured: 1.  gang is accused of using SQL-injection hacks and other methods to gain access to various systems including ones belonging to the U.S. National Geospatial Intelligence Agency the … Read more

what kind of attacks can come?

  attacks will come in all types and methods, some will be standard – and some turbo charged. The reason a new vulnerability is such a big deal, is that any little problem vulnerability can cause a hacker to get a small connection with your systems. And unfortunately any small connection can led to larger … Read more

Heartbleed – on the mend

Internet Storm Center says Heartbleed around the net is slowly being patched. How do they know that?  Well, in case you are not a programmatic person… One can easily scan the Internet to find out what is going on, and that is exactly what the bad guys are doing all the time. They know when … Read more

New Public Breach at sally Beauty Supply

bankinfosecurity has the information   The initial reports were that it was a data breach, but no credit card data was stolen, but 11 days later it looks as many as 25,000 records were exposed and stolen Sally Beauty Supply operates approximately 500 stores worldwide and had $3.6 billion in sales in 2013.   As … Read more