After my last post, a new article came out about the Backoff malware. The article, quoting the US Department of Homeland Security, said that over a thousand small, medium and enterprise U.S. businesses have been compromised by the Backoff malware package. Backoff is fairly new – first seen last year – and scrapes the memory […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article in Venturebeat the other day suggested 7 reasons why we are going to continue to see credit card breaches at retailers. First I will share their list, then I will add my own. Their list includes: The PCI standard is failing to protect merchants from breaches Merchants are not implementing P2PE Retailers introduce […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
According to an article on CNN’s web site, many traffic lights in the US are easy to hack. Earlier this summer researchers in Michigan demonstrated how easy it was to hack into the traffic lights in an undisclosed city. The traffic lights in question are made by Econolite, the largest manufacturer of traffic controls in […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
I just read a white paper on a security vendor’s (Prevoty.com) web site and I think they really understand the problem. I have not had a chance to review their products, so I make no claims about them, but I do recommend reading the article. First a quote from the paper: Traditional security is like […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
It has been reported in the NY Times, among other places, that a Russian crime gang has amassed 1.2 BILLION userid/password combinations, along with 500 million email addresses. Even to me, that is a large number. The passwords represent data stolen from 420,000 web sites, including both large and small companies. The bad news is […]
Continue reading →
[DISPLAY_ACURAX_ICONS]
An article at Investors.com made a number of good points, but I have a bone to pick about one point. First the good points – One of the many changes that the Internet brought about is that it is easier than ever to steal someone’s data. You don’t have to break in to someone’s house […]
Continue reading →
[DISPLAY_ACURAX_ICONS]