Attendees at Black Hat were surveyed and the results are no more reassuring than last year. 15% have no doubt that they will have to respond to a major security breach in the next year, 25% say it is highly likely and 32% say it is somewhat likely. 63% of the security pros say that […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
You might wonder how an attack against a large healthcare provider would expose both patient records and credit cards used in the cafeteria. Stay tuned to learn how not to follow in their footsteps. The attack on Banner Health began in mid June and was discovered only a few weeks later. However, in that short […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
While the Target, Home Depot, Anthem and Office of Personnel Management breaches, among other large breaches, get most of the headlines, according to Travelers Insurance, 62% of all breaches hit small and medium size companies. Those statistics only cover the 34,000+ known incidents per day that are reported. Many more are undetected or intentionally not […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
If you have about $12 to spare, you can eavesdrop on many wireless USB keyboards. That means that you can capture web sites, userids, passwords, socials, credit card numbers and anything else someone might type in. The problem with the USB keyboard (and likewise USB mouse) standards is that the standard didn’t say anything about […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A lot of big financial institutions are ‘investigating’ the use of the blockchain technology that the digital currency Bitcoin uses. I would point out that this is very different that endorsing the use of Bitcoin. In 2014 the Mount Gox Bitcoin exchange filed for bankruptcy after a breach lost $460 million. In May of this […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
A thousand-fold increase in crypto malware (AKA ransomware) is a pretty impressive number. The reason is that it is like taking candy from a baby – not very hard. Rather than having to figure out how to break into a computer, then figure out where the juicy data is, next getting it back to you without […]
Continue reading →
[DISPLAY_ACURAX_ICONS]