Criminal Vietnamese Caught Selling Identities – Patch Tuesday Has Critical Patches

2 major stories of note today, first a Vietnamese http://krebsonsecurity.com/2015/07/id-theft-service-proprietor-gets-13-years/   Obviously from the KrebsonSecurity website Screenshot as of July15 morning. Mr. Ngo had a ‘business’ that sold identity information to other entities for millions of dollars, with the full number of stolen identities unknown. At least 13673 US citizens had their identities stolen and had their … Read more

DDoS Attacked HotSchedules -Down For 45 Hrs

http://www.darkreading.com/cloud/inside-a-vicious-ddos-attack/a/d-id/1321286 has the full story – it is worth your time for you to read it.   The technical overview by the CEO is the following (from article): { The assailants hit with 10- to 15 gigabytes per second (Gbps) of traffic – 250 times our standard rate. When I called my peers in banking and … Read more

With ABC Inc. Product You Will Be Safe

InformationWeek Dark Reading  has another article bemoaning the proliferation of Cybersecurity products: http://www.darkreading.com/endpoint/in-the-cyber-realm-lets-be-knights-not-blacksmiths/a/d-id/1321176 Yes in a couple of weeks (at BlackHat USA 8/1- 8/6) there will be many new products touting some new way to do the same basic items: SIEM -Security Information event Management and protection. Detect the bad and delete it. Most of … Read more

How Much$ Can Good IT Security Save You?

http://oversitesentry.com/cisco-vni-says-3x-more-data-by-2019/ Above image is from my post May 31, 2015 – as Cisco surveyed data traffic 2014-2019 (going up – Internet traffic will triple) We know there will be more Internet traffic in the future, so how much do we spend on securing our networks?     To keep it simple, let’s pretend there is a … Read more

We Can Learn From Industrial Firewall Architecture

https://ics-cert.us-cert.gov/sites/default/files/ICSJWG-Archive/F2012/D1_PM2_Tr1_Ginter_wf-13-ways-icsjwg-2012-d2.pdf Andrew Ginter  has an interesting presentation (Director of Industrial Security – Waterfall security Solutions) Notice how in an ICS (Industrial control System)  environment there are firewalls seperating different networks from the plant floor (the device floor has PLC’s) But let me dispel some notions here, an ICS environment includes this Picture from threatpost.com  which looks … Read more