Monthly Archives: July 2016

CEO Fired After Fake Email Loses Firm $47 Million

FACC, in May has let their CEO, Walter Stephan, go after a fake email made it’s way to the financial controllers office and €52.8 million ($58 million USD) was wired out of the company. It caused their stock to drop … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on CEO Fired After Fake Email Loses Firm $47 Million

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

The Neus

Justin Neu came to town with his family, another Marine I haven’t seen in 20 years! We had to make a recreation of one of our pictures from when we were young and dumb.    

Posted in life | Comments Off on The Neus

Social Media Security

Here is an infographic on Social Media Security Basics

Posted in Security Blog | Tagged , , | Comments Off on Social Media Security

National Crime Agency in the UK

The National Crime Agency in the UK has published the National Crime Assessment, it is a fantastic read and can be found here. An interesting fact is that plain crime is at 47% total crimes committed, while computer misuse and … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on National Crime Agency in the UK

Infographic/Pictogram on Spearphishing

I got this from the RSA website. It illustrates the anatomy of an attack.  

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic/Pictogram on Spearphishing

1/3 of Wendy’s Locations Compromised

1,025 out of the 3,000 Wendy’s locations had malware on their Point-Of-Sale systems. Investigation has uncovered that infection and exfiltration of credit card information (names, numbers, expiration dates) going back to January of 2015. We believe this series of cybersecurity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on 1/3 of Wendy’s Locations Compromised

Are You Being Tracked?

Posted in Security Blog | Tagged , , | Comments Off on Are You Being Tracked?

Sterling and Poseidon’s Raft

Jaime and I got the boat, Poseidon’s Raft, back up and running smoothly. We had to clean it pretty good as it sat for two years since the last time we used it. I loved getting back out to the … Continue reading

Posted in Boating, life | Tagged , , , | Comments Off on Sterling and Poseidon’s Raft

Top 5 CyberThreats of 2016 To Attack or Defend Against

Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against