Tag Archives: 2015

The Internet of Shit

There are so many things that are spawning with Internet of Things technology. Internet connected everything! Most devices spy on us… What happens when devices learn they can blackmail us? The Internet of Shit’s Twitter presence is one to follow.

Posted in Security Blog | Tagged , , , , | Comments Off on The Internet of Shit

CVS Photo – Data Breach

Credit card information collected by the independent vendor who manages and hosts CVSPhoto.com may have been compromised, and customer registrations related to online photo processing and CVSPhoto.com are completely separate from CVS.com and the pharmacies. Financial transactions on CVS.com and … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on CVS Photo – Data Breach

Infographic on Data Breaches

Posted in Security Blog | Tagged , , , | Comments Off on Infographic on Data Breaches

Excellus Healthcare (Blue Cross Blue Shield) Data Breach

Attackers may have gained access to Excellus clients’ names, dates of birth, Social Security numbers, mailing addresses, telephone numbers, member identification numbers, financial account information and claim information as indicators of compromise goes back to 2013. Excellus has a client … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Excellus Healthcare (Blue Cross Blue Shield) Data Breach

Ashley Madison Users Don’t Know Password Security

It took about 10 days to crack over 11 million passwords of Ashley Madison subscribers/users. Here are some of the worst ones…

Posted in Security Blog | Tagged , , , , | Comments Off on Ashley Madison Users Don’t Know Password Security

Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers

The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers

Vehicle Automation Susceptible to DoS Attacks

Self driving cars are pretty darn cool, but so are cybersecurity attacks against them. Like stopping them in their tracks with a laser pointer. No kidding! Security researcher, Dr. Jonathan Petit, (English version of little john… lol) points out the … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Vehicle Automation Susceptible to DoS Attacks

1st Half of 2015’s Data Breaches – Infographic

Here are some awesomely shocking numbers related to data breaches of 2015s 1st half of the year. Get the report here.

Posted in Security Blog | Tagged , , , , | Comments Off on 1st Half of 2015’s Data Breaches – Infographic

Here’s Why Physical Security Walkthroughs Are a Great Test

If you act like you belong, it’s not often you get questioned about your actions. This has been proven time and time again at many places with a lot of turnaround. This has especially worked well for a recent Walmart … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Here’s Why Physical Security Walkthroughs Are a Great Test

Security Awareness Training Evolution

The lesson here, is that you shouldn’t make security awareness training; dull, boring, and strictly compliance based. Keep it: Fun Fresh Measurable

Posted in Security Blog | Tagged , , | Comments Off on Security Awareness Training Evolution