Blog

Blog

Could Emoji Passcodes be Safer for Online Bank Users?

Image What more can be done about passwords? We tell users to choose unique, complicated passwords that contain a gallimaufry of bizarre characters - and they tell us they're impossible to remember, especially when they need to remember different passwords for the many different websites out there. We tell computer users to get help...
Blog

Belgium's Privacy Commission Sues Facebook

Image Belgian's national privacy watchdog is suing Facebook for allegedly breaching both Belgian and European privacy laws for the way that it tracks the behavior of both members and non-members. According to EUobserver, this is the first time a European privacy commission has sued Facebook for its non-compliance with regards to...
Blog

DD4BC Group Targets Companies with Ransom-Driven DDoS Attacks

Image According to the 2015 Information Security Breaches Survey, a PwC study that I recently analyzed in an article for The State of Security, the number of denial of service (DoS) attacks has either dropped or remained stagnant for most UK corporations over the past year. Apparently, this decline has not stopped certain malicious...
Blog

Germany Drops Merkel NSA Phone Tapping Probe

Image Germany has dropped an investigative probe into the alleged tapping of Angela Merkel's cellphone by the National Security Agency (NSA). According to BBC News, the office of federal prosecutor Harold Range said that not enough evidence had been obtained to justify legal action. Germany's decision to drop the probe marks the end...
Blog

Data Location and Risk Haunt IT Pros' Dreams, Reveals Study

Image Today’s evolving online threat landscape is challenging enterprises to make changes that will enhance their security. The threat of a data breach, for instance, is leading many organizations to invest in measures that will help protect their data. Even so, what intelligence is guiding these decisions remains uncertain. It is...
Blog

UK Surveillance Powers Need 'Clean Slate,' Says Reviewer

Image An independent reviewer in the United Kingdom has called for a new "comprehensive" law to help define security services' online surveillance powers. According to BBC News, David Anderson QC, an independent reviewer of terrorism legislation, stated that a "clean slate" is needed in the approach to surveillance powers used by...
Blog

Why It’s Not Too Soon to Learn From The OPM Hack

Image Speculation is rife. The OPM hack will become a fascinating story if we ever actually learn the details – how exactly did attackers penetrate and exfiltrate millions of federal employee records? What weaknesses did they exploit, and how did they escalate access? More to the point, what protections could have or should have...
Blog

iOS Mail bug makes it easy to steal victims' passwords

Image I would wager that most people who have an iPhone or iPad use the default Apple iOS Mail application, rather than a third-party app, to read their email. And if you're one of those people, you could be at risk from an unpatched vulnerability that could allow hackers to convincingly trick you into handing them your passwords. As...
Blog

VERT Threat Alert: June 2015 Patch Tuesday Analysis

Image Today’s VERT Alert addresses 8 new Microsoft Security Bulletins. VERT is actively working on coverage for these bulletins in order to meet our 24-hour SLA and expect to ship ASPL-618 on Wednesday, June 10th.   MS15-056 Internet Explorer Information Disclosure Vulnerability CVE-2015-1765 Multiple Elevation of...
Blog

Ransomware Nearly Doubled in Q1 2015, Reports McAfee Labs

Image According to a report issued by Intel Security Group's McAfee Labs, ransomware has experienced a 165% increase in the first quarter of 2015. McAfee Labs Threats Report: May 2015 reveals that this increase has been fueled in part by the impression of underground criminals that victims in rich countries seem to be the most willing...
Blog

MalumPoS Malware Targeting the Hospitality and Retail Industries

Image A security firm has identified MalumPoS, a new type of point-of-sale (PoS) malware that is targeting businesses in the hospitality, food and beverage, and retail industries. According to a blog post published by global security software company Trend Micro, the authors of MalumPoS designed the malware to collect data from PoS...
Blog

China Denies Responsibility for U.S. Federal Data Breach

Image China has denied responsibility for a data breach at the U.S. federal government that is believed to have compromised the personal information of former and current employees. According to a statement released by the U.S. Office of Personnel Management (OPM), the federal agency that is responsible for screening and hiring...
Blog

What's Left Behind: Oracle TNS Listener Log Files After an IP360 Scan

Image Ever looked at the messages in the Oracle listener logs generated by Tripwire IP360 scans and wondered what was going on? The most common one you see probably looks something like this: 01-JUN-2015 12:39:37 * (CONNECT_DATA=(COMMAND=VERSION)) * version * 1189 TNS-01189: The listener could not authenticate the user TNS-01169:...
Blog

New York Becomes First State to Set Bitcoin Trading Regulations

Image New York’s Superintendent of Financial Services Benjamin Lawsky announced on Wednesday a new set of rules and regulations for businesses accepting, selling or buying virtual currencies. Following nearly a two-year-long effort, Lawsky introduced the first-ever comprehensive framework – known as BitLicense – in a speech at the...
Blog

IT Security: Evolving to a Risk-Based Approach

Image As news of information breaches and personal data theft become more prevalent and popular in the press, technologists are witnessing and taking part in the rapid evolution of the once neglected realm of cybersecurity. Hopefully, this process results in an integrated, enlightened solution to what is a very complicated puzzle. ...
Blog

Here's What You Missed at BSides London 2015

Image The Security BSides concept is brilliant. After being founded in 2009, it’s spread like wildfire. There are now dozens of regional events that take place around the world, and if you take a look at their website, you’ll more than likely find one not too far away. For any of you that don’t know, the principles behind the idea...
Blog

Pro-ISIS Hackers Are Targeting News Outlets, Says Security Firm

Image A security firm has issued a warning that sympathizers of the Islamic State extremist terrorist group (ISIS) are increasingly targeting news media outlets of all sizes. According to a report published by network security company FireEye, what distinguishes these attacks is the fact that all sizes of media outlets are being...