#OpFrance CyberJihad Attacking French Websites By Thousands
Twitter is aflame with the various tweets of the attackers and viewers of what is going on: After my quick review of the top ten in our Security Analyzed page…
What does state-of-art Spear Phishing Look Like?
Hackread has the story: http://hackread.com/outlook-web-app-phishing-page-on-russian-site/ screenshot from fake page as on Hackread That looks like a standard OWA access panel right? Except that it is actually on a Russian site…
Set-Up Proper Internet Security
While reading the ~20 blogs this morning the one from F-Secure hit home: http://community.f-secure.com/t5/BSB-Blog/Why-Internet-security-should/ba-p/65567 Elija is discussing why we should have Internet security: “The 24/7 work culture is also one…
Still Discussing Sony Attack … but why?
The reason is that it was a _Destructive_ attack. Credit card numbers were not stolen. Data was deleted and stolen. Highly unusual attack. Dark Reading has a story on the…
Studying Data Breaches as a whole
IBM has an infographic and a report: http://www-935.ibm.com/services/us/en/security/infographic/cybersecurityindex.html http://www-935.ibm.com/services/us/en/it-services/security-services/cost-of-data-breach/ (we make a point to show you the whole link, so you know exactly where you are going) The image above…
