There are many news reports of Celebrities getting their accounts hacked and then pictures were taken in their archives of a compromising nature. It is…
The security industry is usually very quiet about how security affects their products. So in the new 3rd Quarter IBM threat intelligence Quarterly for 3rd quarter. the…
Hacker attacks occur for many reasons: #1 Highest reason for an attack is to make money from the attack 8/19 Hackers hack Medical company – 4.5…
BloombergBusinessweek article 7/17/2014 a. Discusses how Russian hackers infiltrated the NASDAQ network, b. Placed malware on one of the NASDAQ webservers. c. Thus creating a classic…
Patch Tuesday is the day Microsoft has deemed to give us their vulnerability fixes. It has to be done some time and so it is…
RealclearTechnology has an interesting article (the 4 headings below is my synthesis of the article) It is based out of the Cisco projections (linked in article).…
Since we advocate testing your IT services and devices, what if your organization has cloud services? How about Amazon EC2? AWS compliance keep this in mind.…
KrebsonSecurity has the story (a good security blog) a 24 year old Viet-Nam (Ngo) national helped create a situation where data from Experian was sold…
As noted by us-cert.gov there are many methods of taking advantage of SQL injection opening in a website. The real problem is when companies don’t admit…
NVD or at the http://nvd.nist.gov/home.cfm NIST is the National Institute of Standards and Technology. NVD contains: 62145 CVE Vulnerabilities 231 Checklists 248 US-CERT Alerts…