Tag Archives: 2016

DEFCON 2016

Posted in Security Blog | Tagged , , , , | Comments Off on DEFCON 2016

Happy 25th Birthday to the World Wide Web

The very first webpage was put online 25 years ago today and it’s still available here! The creator is Tim Berners-Lee and his wiki page is impressive :) The Internet (which is the infrastructure on which the web and other … Continue reading

Posted in Security Blog | Tagged , | Comments Off on Happy 25th Birthday to the World Wide Web

CEO Fired After Fake Email Loses Firm $47 Million

FACC, in May has let their CEO, Walter Stephan, go after a fake email made it’s way to the financial controllers office and €52.8 million ($58 million USD) was wired out of the company. It caused their stock to drop … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on CEO Fired After Fake Email Loses Firm $47 Million

National Crime Agency in the UK

The National Crime Agency in the UK has published the National Crime Assessment, it is a fantastic read and can be found here. An interesting fact is that plain crime is at 47% total crimes committed, while computer misuse and … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on National Crime Agency in the UK

1/3 of Wendy’s Locations Compromised

1,025 out of the 3,000 Wendy’s locations had malware on their Point-Of-Sale systems. Investigation has uncovered that infection and exfiltration of credit card information (names, numbers, expiration dates) going back to January of 2015. We believe this series of cybersecurity … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on 1/3 of Wendy’s Locations Compromised

Are You Being Tracked?

Posted in Security Blog | Tagged , , | Comments Off on Are You Being Tracked?

Top 5 CyberThreats of 2016 To Attack or Defend Against

Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against

Gartner Security and Risk Management Summit: Day 2

Keynote Speaker Colin Powell Biography link here

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Gartner Security and Risk Management Summit: Day 2

Gartner Security and Risk Management Summit: Day 1

We arrived into town (Alexandria VA) yesterday and I have been crazy busy since. I hadn’t realized how many friends and how much family I have on this side of the world! So with the already busy conference schedule, I … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Gartner Security and Risk Management Summit: Day 1

Mark Zuckerberg’s Accounts Compromised

Facebook founder, Mark ‘Zuck’ had his Twitter and Pinterest accounts compromised after the LinkedIn data breach that happened back in 2012, through the recent sale of the emerged data. It’s proof positive that one must diversify usernames and passwords, close … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Mark Zuckerberg’s Accounts Compromised