Archive for the "Security" Category

We Phish Yahoo! a Merry Christmas :-)

Can your "backup address" make it easier for hackers to target you? Yes, yes it can!

Infiltrate, Exfiltrate, and… Inject?

This is a blog about spying in the Internet era. While activists would have you believe that it’s all about online personas, there is still a lot of cloak-and-dagger up close and personal spying going on. When Edward Snowden dumped his files, many Western spy agencies had to pull back agents because their covers were blown. […]

If You Want a Sandbox, Why Not Hit the Beach?

Why are my security engineers asking me for money to buy a sandbox? Can't they just go to the beach like everyone else?

The Invasion Of The Biometric Identity Snatchers

What happens when someone copies your fingerprints or makes a contact lens with a copy of your iris? If someone steals your biometrics, they may be able to prove that they’re you. If you like being “you” – and you’d rather not share that distinction with anyone else – the new world of biometrics is definitely worth thinking about.

Would Encryption Have Prevented The Target Hack?

Security professionals need to be performing the same kinds of risk analysis and business impact analysis that business continuity professionals have been doing for dozens of years. As part of that risk analysis you need to determine your most important information, its lifetime, and whether or not you are properly protecting it.

Is There a Target On My Back?

Target didn't know they were hacked until they learned about it from a third-party forensics firm. How could Target not know that its own systems were hacked? You might be surprised how many companies have no clue...

Are You Putting Your Organization At Risk?

In today's always-on world, not only are employees talking about your latest secret project in public, they probably are working on it. Does this make your company an easy target for industrial espionage? The answer probably is yes.

When Is A Backup Not A Backup?

Even though his data was in the cloud and on multiple machines, Matt Honan lost a year's worth of photos, emails, documents, and who knows what else. The lesson? Back up to disk, tape, or something else and lock it away.

What To Do In An Active Shooter Situation? Part 1

Although it makes people uncomfortable to discuss, you should understand what to do if you are involved in an active shooter situation. This will be a series and the first post points you to an online training course that your entire family can take to help you understand your options if you find yourself in the middle of an active shooter situation.

Anonymous Hacks FBI Conference Call On Cyber Pirates

Anonymous posted a 16-minute recording of a call in which U.S. and foreign law enforcement officials discussed two alleged teenage members. Pundits say there was an email hack. FBI says someone forwarded the concall email. No matter how it happened, it needs to be prevented from happening again.