Archive for the ‘Security’ Category

By Ondrej Krehel,

Back when the Internet was a baby, and I was taking my first steps in network security, hackers were a fairly homogeneous lot.

Sure, some were scamming businesses for personal gain, but most were simple graffiti artists – breaking into popular websites to splash around some MS Paint. It was a way to rebel and earn credibility within the computer community.

(more…)

 

By Ondrej Krehel,

You can’t opt out of real life. Yet often that’s what a lot of cyber security advice sounds like. It’s true that social networks are a hotbed for malware, hackers and spam. But staying off Facebook — for some people in certain industries — could have real-world repercussions.

Signing up for an online service, participating in an Internet auction, enrolling in a rewards program: it’s almost like playing in a casino. Which is going to lose your data tomorrow? Picking online companies we do business with is almost like placing a bet.

(more…)

A massive cyber attack on American infrastructure is the 21st-century equivalent of the neutron bomb. All buildings remain standing but systems inside them are rendered useless. Human beings aren’t killed on a large scale, but few, if any, are left standing either. And while this sounds pretty dire, it’s quite likely some segment of this nation will at some time be shut down by cyber terrorists.

(more…)

By Ondrej Krehel, Identity Theft 911

In an earlier post we talked about how malware is built to morph or change to avoid detection. This time we’ll look at what security firms are doing about it.

The short answer is heuristics or self-educating computer programs.
(more…)

By Ondrej Krehel,

Call them digital ninjas.

Hackers have created a new cyber-superweapon designed to gather information that would enable a future attack, . The new computer virus, called Duqu (dyü-kyü), resembles code in Stuxnet, a highly sophisticated worm that was .
(more…)

 

For National Cybersecurity Awareness Month we’ve flagged our top 10 don’ts for businesses that want to maintain network security. From password faux pas to lax login habits, stay away from these bad practices.

 

 

 

 

Intellectual property theft isn’t new. But hacker attacks on companies and governments used to be hush-hush, coming to light only years after the fact.

Now, it seems they’re making headlines on a weekly basis. This year alone we’ve read about hacker attacks on a number of governments and corporations.

Read more about cyber war , in Ondrej Krehel’s latest article “Digital Espionage in the 21st Century.” (more…)

By Matt Cullina,

The email below popped into my inbox this morning—and it was suspicious from the start.

What immediately caught my eye: a partially listed credit card number, a request to download information, and a threat that my card would be blocked if I didn’t input requested information correctly.

(more…)

By Brian McGinley,

We have moved from being a computer-assisted society to one that is computer-dependent. Controlling that dependence is critical to maintaining a secure operation. Admittedly, that requires assistance from technical experts. But good control begins with a company’s employees, an area you can’t afford to ignore, and which I covered in an earlier post.

(more…)

By Brian McGinley, Identity Theft 911

In my last post, we established a foundation of control with the first seven steps to smarter security. This is the base on which we can build sound management practices, which is what we’ll cover in Steps 8 through 14.

8.    Set up a How-to Plan for Managing an Information Breach

When a breach happens it’s imperative to:

•    Identify it and escalate to the appropriate management and subject matter expert resources within the organization to initiate the launch of a deliberate breach response plan.
(more…)