Credit Card Thieves Caught in Saint Louis area

Fox2 a local TV media channel (in Saint Louis area) has the story: http://fox2now.com/2015/01/12/police-bust-credit-card-thieves-from-detroit/   Why do I bring this up in a cyber security blog? Due to this little info blurb: “Maryland Heights police searched the vehicle, and found fake Michigan drivers’ licenses, dozens of pre-paid MasterCard gift cards, and pricey electronics.” and “Fedak … Read more

Another Desktop Exploit – Silverlight Problem

Checkpoint has the scoop: http://www.checkpoint.com/downloads/partners/TCC-Silverlight-Jan2015.pdf Silverlight exploits may be less common, but unfortunately this particular exploit obfuscates itself and can infect the desktop that has loaded Silverlight. Background to Silverlight: “The Silverlight framework enables the development of web applications with features similar to those of Adobe flash and Java Applets. The Silverlight runtime environment is … Read more

Krebs notes Lizard attacked Sony with home routers

The hacker group Lizard Squad  that attacked Sony and Microsoft on Christmas day: http://oversitesentry.com/christmas-hacking-while-you-were-out/ This was the result of their attack:   Brian Krebs has done research (as he does) and has found that the Lizard group has been hacking default password home routers around the world, and it seems they used them to attack … Read more

Mac and Video Game Hacks

Video Games are getting more connected to the Internet, and thus are more likely to be hacked or DOS’ed (Denial of Service) Trend Micro listed a few items that happened http://blog.trendmicro.com/video-game-vulnerabilities/?linkId=11643669 The Xbox hack happened on Christmas day 04 2014: http://oversitesentry.com/christmas-hacking-while-you-were-out/ I tried to go to the Sony website on Christmas: And I got site … Read more

Can We Stop Cybersecurity Breaches?

Dark Reading has an article on PCI compliance from end of last year: http://www.darkreading.com/risk/compliance/how-pci-dss-30-can-help-stop-data-breaches/a/d-id/1318306 An important paragraph: “In the cases of the largest data breaches, in 2014 a common point of vulnerability was the exploit of remote access methods to implant malware on systems that store, process, or transmit cardholder data. Frequently the point of … Read more