Set-Up Proper Internet Security
While reading the ~20 blogs this morning the one from F-Secure hit home: http://community.f-secure.com/t5/BSB-Blog/Why-Internet-security-should/ba-p/65567 Elija is discussing why we should have Internet security: “The 24/7 work culture is also one…
Still Discussing Sony Attack … but why?
The reason is that it was a _Destructive_ attack. Credit card numbers were not stolen. Data was deleted and stolen. Highly unusual attack. Dark Reading has a story on the…
Studying Data Breaches as a whole
IBM has an infographic and a report: http://www-935.ibm.com/services/us/en/security/infographic/cybersecurityindex.html http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/ (we make a point to show you the whole link, so you know exactly where you are going) The image above…
Amazing to note Telnet vulnerability Patch Tuesday
Microsoft has a Telnet vulnerability which has a critical remote code execution. (MS15-002) https://technet.microsoft.com/library/security/ms15-jan This is true: “Only customers who enable telnet on Windows 2003 are affected (it is installed…
Credit Card Thieves Caught in Saint Louis area
Fox2 a local TV media channel (in Saint Louis area) has the story: http://fox2now.com/2015/01/12/police-bust-credit-card-thieves-from-detroit/ Why do I bring this up in a cyber security blog? Due to this little info…
