In an August 12, 2014 post on Pymnts.com, the information security executive at Urban Outfitters, Dawn-Marie Hutchinson, argued against disclosure of breaches. In fact, the company’s policy is to notify their lawyers first so that they can use attorney-client privilege. While I sort of understand the concept of not disclosing things too soon (like before […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to a presentation at the SysScan 360 security conference, Anti Virus software and other security products have security flaws just like every other piece of software on the planet. To some of us, that does not come as a big surprise. The researcher, Joxean Koret, tested a number of security products and found issues with […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It has been reported in the NY Times, among other places, that a Russian crime gang has amassed 1.2 BILLION userid/password combinations, along with 500 million email addresses. Even to me, that is a large number. The passwords represent data stolen from 420,000 web sites, including both large and small companies. The bad news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an item on Govtech, The FBI is looking for a little help from businesses in their effort to bring cyber criminals to justice. Assistant AG for National Security John Carlin and FBI Director James Comey said they need more than knowing how a breach occurred. They also want to know why the bad […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
Those of you who have been following the Target Company’s security breach are probably aware that the publicly stated source of the breach was a heating vendor who clicked on a malicious email and set the wheels in motion for one of the largest security breaches ever. Since since the old adage says that your firm’s […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article at Investors.com made a number of good points, but I have a bone to pick about one point. First the good points – One of the many changes that the Internet brought about is that it is easier than ever to steal someone’s data. You don’t have to break in to someone’s house […]
Continue reading →
[DISPLAY_ACURAX_ICONS]