Monthly Archives: September 2015

Don’t Be a Victim of Tech Support Scams

This year alone, an estimated 3.3 million people in the United States will pay more than $1.5 billion to scammers. Attorney General Bob Ferguson and experts from Microsoft explain how scammers pretending to help you with computer problems can steal … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Don’t Be a Victim of Tech Support Scams

19 Laws of Information Security

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 19 Laws of Information Security

How the Internet Blackmarket is Structured

The video above shows the mapping of how the blackmarket works. Research done @Google in collaboration with Berkeley, Databricks, UCSD, UCSB, George Mason University and Michigan State University.

Posted in Security Blog | Tagged , , , , | Comments Off on How the Internet Blackmarket is Structured

Volkswagen Hack

In the traditional meaning of the word hack, there are some half-million diesel powered Volkswagens out that have the capability to detect when they are hooked up to an emissions computer and switch modes to ‘burn clean’, which are normally … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Volkswagen Hack

Remember Galen Marsh?

I wrote about Galen Marsh as the guy who posted the information of 900 clients on PasteBin with promises that he had a LOT more to sell. Roughly the private information on 730,000 Morgan Stanley clients. There was rumor that … Continue reading

Posted in Security Blog | Tagged , | Comments Off on Remember Galen Marsh?

The Internet of Shit

There are so many things that are spawning with Internet of Things technology. Internet connected everything! Most devices spy on us… What happens when devices learn they can blackmail us? The Internet of Shit’s Twitter presence is one to follow.

Posted in Security Blog | Tagged , , , , | Comments Off on The Internet of Shit

CVS Photo – Data Breach

Credit card information collected by the independent vendor who manages and hosts CVSPhoto.com may have been compromised, and customer registrations related to online photo processing and CVSPhoto.com are completely separate from CVS.com and the pharmacies. Financial transactions on CVS.com and … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on CVS Photo – Data Breach

Infographic on Data Breaches

Posted in Security Blog | Tagged , , , | Comments Off on Infographic on Data Breaches

Excellus Healthcare (Blue Cross Blue Shield) Data Breach

Attackers may have gained access to Excellus clients’ names, dates of birth, Social Security numbers, mailing addresses, telephone numbers, member identification numbers, financial account information and claim information as indicators of compromise goes back to 2013. Excellus has a client … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Excellus Healthcare (Blue Cross Blue Shield) Data Breach

Ashley Madison Users Don’t Know Password Security

It took about 10 days to crack over 11 million passwords of Ashley Madison subscribers/users. Here are some of the worst ones…

Posted in Security Blog | Tagged , , , , | Comments Off on Ashley Madison Users Don’t Know Password Security