Tags » Information Security

Secret Service estimates type of malware that led to Target breach is affecting over 1,000 U.S. businesses

The Secret Service estimated that more than 1,000 businesses in the United States have been affected by one type of PoS malware, dubbed “Backoff.” Seven point of sale providers “have confirmed that they have had multiple clients affected,” said the advisory, adding that “reporting continues on additional compromised locations, involving private sector entities of all sizes.” The agencies encouraged all organizations to check for the the malware, which they say was not recognized by antivirus solutions until this month.

21 more words
Cyber Fraud

Study: Organizations lack training, budget to thwart insider threats

More than 60 percent of the 355 IT and security professionals polled by security firm Spectorsoft in their “2014 Insider Threat Survey” indicated that they weren’t prepared to respond to insider attacks.

96 more words
Information Security

Important Lesson: JPMorgan Chase customers targeted in massive phishing campaign

IMPORTANT LESSON: Banks do not send emails asking you to provide your credentials!

Customers of JPMorgan Chase are the target of a massive multifaceted phishing campaign impacting mostly people in the U.S., according to security firm Proofpoint.

81 more words
Information Security

Do You Trust Your Ex-Employees?

It’s one thing to ask whether companies truly trust their employees with company information, but I think most would agree that trusting their ex-employees is definitely not desirable. 677 more words

Enterprise Software

Woof Woof, Bark Bark (or how to not support security in your organization).

I recieved the email below from a colleague at work. At first glance it is funny, the chief security officer being represented by a dog… Hilarious! 671 more words


In supersecret cyberwar game, civilian-sector techies pummel active-duty cyberwarriors

When the military’s top cyberwarriors gathered last year inside a secretive compound at Fort Meade, Maryland, for a classified war game exercise, a team of active-duty troops faced off against several teams of reservists.

48 more words
Information Security

Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014

Power exists to be used. Some wish for cyber safety, which they will not get. Others wish for cyber order, which they will not get. Some have the eye to discern cyber policies that are “the least worst thing;” may they fill the vacuum of wishful thinking.

Information Security