Blog

Blog

10 Notorious Cyber Criminals Brought to Justice – No. 4

Image Last week, we investigated the story of Vladislav Anatolievich Horohorin, a Ukrainian hacker who was well known online for managing several web forums where cyber criminals could dump and sell users’ stolen payment card credentials. Tripwire now continues its series on some of the most notorious cyber criminals brought to...
Blog

Chipotle Website & Twitter Account Hacked

Image Chipotle's website and official Twitter account were compromised late Saturday evening and into Sunday morning. The website was redirected on Saturday around 6PM (PST) to Chipotle's official twitter account @chipotletweets and was then unresponsive. The Chipotle domain's technical and administrative contacts for the domain have...
Blog

How Anthem Could Be Breached

Image According to the Associated Press, the attackers who targeted and exfiltrated more than 80 million customer records from Anthem Inc, were able to commandeer the credentials of at least five different employees.  We know from Anthem themselves that at least one admin account was compromised, as the admin himself noticed his...
Blog

The Year of The Hack

Image It seems only fitting that 2014 should have ended with the much publicized hacking of Sony as the American public was inundated all year with one sensational account after another of damaging data security breaches. Those surrounding Target, UPS, K-Mart, Staples, Dairy Queen and Home Depot have certainly received the full...
Blog

Microsoft Packing More CVEs into Fewer Security Bulletins

Image   Patch Tuesday, the unofficial day on which Microsoft regularly releases security updates for its software products, has long been a staple of the information security community. On the second (and sometimes fourth) Tuesday of every month, Microsoft releases a unique set of security bulletins that provide patches for a range of...
Blog

Cyberattack Projected to Have Little Impact on Sony’s Earnings

Image Sony’s projected third quarter earnings suggest that a cyberattack back in November of 2014 will have a lower financial impact on the conglomerate than originally expected. As of this writing, Sony was posed to announce a net profit of ¥31.91 billion ($269.54 million) for Quarter 3 in 2014, compared to a net profit of ¥27...
Blog

The 60/40 Security Rule

Image On any journey we take as we progress through life, occasions will arise when we arrive at a juncture where we recognise that somewhere way-back, we may have taken a wrong turn, which has brought us to a less than ideal place – an imposition which I believe we find ourselves in today with mitigating cyber crime and its...
Blog

Harvesting Your Data From The Internet of Things

Image Last week, I presented a talk at OWASP's AppSec California titled "We All Know What You Did Last Summer," where I spoke on the topic of privacy, security and the "Internet of Things." My primary focus was not necessarily on the privacy and security of devices themselves, but more regarding the security implications of the data...
Blog

Comparing Cross-site Scripting Vulnerabilities

Image Cross-Site Scripting (XSS) vulnerabilities can, unfortunately, be found in all types of web-based applications. Indeed, they appear to be rather ubiquitous across the web. XSS falls into the category of code injection vulnerabilities and is a result of web-based applications consuming user-supplied input without proper filtering...
Blog

Cybercriminals Use RansomWeb Attacks to Hold Website Databases Hostage

Image A security firm has identified a new method of attack in which hackers encrypt the data stored on website servers and demand a ransom payment for the decryption key. In an article posted on its blog, High-Tech Bridge explains how its security experts first detected the attack back in December of 2014. According to the firm’s...
Blog

The Voice of the CISO: Interview with Brian Engle

Image Last month, we interviewed Thom Langford, the Director of Sapient’s Global Security Office. Among other things, he explained to us how critical people are to an organization’s cyber security success, not to mention how the CISO is instrumental in framing security issues so that different target audiences can understand them. As...
Blog

How to Manage Certificate Expiration Effectively

Image Tripwire Enterprise isn’t just a change detection and compliance tool. The core ability to execute commands on agent boxes and network devices, capture the results and run the results through a series of tests can be applied to other use cases, as well.  These use cases are limited only by the imagination of the user. One such...
Blog

Raptr Hacked, Users Asked to Change Their Passwords

Image Raptr, a popular gaming social network website, has urged all of its users to change their passwords following a recent hack. In a security update message posted on Raptr’s site, Founder and CEO Dennis Fong disclosed the incident to the Raptr community: “Maintaining the highest level of security around your Raptr account...
Blog

Cyberterrorists Seek to Cause Physical Harm

Image The premise of a January 27, 2015, article by CNBC is that there is good evidence that a cyber attack against nearly any country’s critical infrastructure could be imminent. This kind of reporting has become so commonplace, but this doesn’t seem like just more FUD (fear, uncertainty, and doubt) journalism. According to Eugene...