After my last post, a new article came out about the Backoff malware. The article, quoting the US Department of Homeland Security, said that over a thousand small, medium and enterprise U.S. businesses have been compromised by the Backoff malware package. Backoff is fairly new – first seen last year – and scrapes the memory […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article in Venturebeat the other day suggested 7 reasons why we are going to continue to see credit card breaches at retailers. First I will share their list, then I will add my own. Their list includes: The PCI standard is failing to protect merchants from breaches Merchants are not implementing P2PE Retailers introduce […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an article on CNN’s web site, many traffic lights in the US are easy to hack. Earlier this summer researchers in Michigan demonstrated how easy it was to hack into the traffic lights in an undisclosed city. The traffic lights in question are made by Econolite, the largest manufacturer of traffic controls in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I just read a white paper on a security vendor’s (Prevoty.com) web site and I think they really understand the problem. I have not had a chance to review their products, so I make no claims about them, but I do recommend reading the article. First a quote from the paper: Traditional security is like […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
In an August 12, 2014 post on Pymnts.com, the information security executive at Urban Outfitters, Dawn-Marie Hutchinson, argued against disclosure of breaches. In fact, the company’s policy is to notify their lawyers first so that they can use attorney-client privilege. While I sort of understand the concept of not disclosing things too soon (like before […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to a presentation at the SysScan 360 security conference, Anti Virus software and other security products have security flaws just like every other piece of software on the planet. To some of us, that does not come as a big surprise. The researcher, Joxean Koret, tested a number of security products and found issues with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]