Monthly Archives: February 2015

NSA Wants Access to Encrypted Data Too!

The director of the U.S. National Security Agency, Michael Rogers, wants access to encrypted data on computers and other devices. He’s working on developing a framework that will enhance investigations. This functionality should be enabled by software manufacturers, but hopefully … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on NSA Wants Access to Encrypted Data Too!

China Bans Security, or Wants to

China’s new counter terrorism law will require technology firms to hand over encryption keys and install security “backdoors”. Once source says “You are no longer allowed a VPN that’s secure, you are no longer able to transmit financials securely, or … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on China Bans Security, or Wants to

Net Neutrality Wins

The FCC has adopted net neutrality effectively banning “throttling”!

Posted in Security Blog | Tagged , , | Comments Off on Net Neutrality Wins

Your Life Online After you Die

Posted in Security Blog | Tagged , , | Comments Off on Your Life Online After you Die

Gemalto and the Great Sim Encryption Key Theft

Edward Snowden leaked via the Intercept, The National Security Agency (NSA) and the Government Communications Headquarters (GCHQ) jointly hacked into the internal network of the largest Subscriber Identity Module (SIM) card creator and manufacturer, who also puts the chips into … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Gemalto and the Great Sim Encryption Key Theft

Identity Theft, of the Children

Imagine getting credit card bills and hospital bills for your children, yet they are very young and barely in school yet. This is what is happening to children throughout the United States, and will continue to happen by the millions. Since … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Identity Theft, of the Children

Lenovo Superfish

Superfish is pre-installed Lenovo adware (thanks Lenovo!), which is meant to place advertisements in your web browser. The problem is that the software also intercepts encrypted traffic, which opens up your computer to man-in-the-middle attacks. Superfish intercepts HTTPS connections. Security … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Lenovo Superfish

Kapersky Reports Increase in Phishing

Kaspersky recently reported that 28.8 percent of phishing attacks in 2014 tried to steal financial data from consumers. Information as of late, that has been getting stolen, WILL be used in more phishing attacks in 2015. Here is a snippet from … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Kapersky Reports Increase in Phishing

Survey Says 80% of Security Risks are Users

Bromium surveyed 100 security professionals to see what they thought their biggest security risk was. Through my own research, I have found that the best way to give security awareness training, is NOT this way, with one time security awareness … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Survey Says 80% of Security Risks are Users

The Equation Group

Possibly around 1996, but more actively in 2001, the Equation Group has been doing some really hardcore hacking on targets throughout the world. Their methods are far up the supply chain, as they would intercept and infect CDs and other … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Equation Group