Tag Archives: risk

Uber Accounts, $1

Stolen Uber Customer accounts are for sale on the Dark Web for the low price of $1.00. Though most of the credit cards are masked, the last four and the expiration date are still available. The rest of the data … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Uber Accounts, $1

Would You Buy Your Kids A “Hello Barbie” Doll?

Most kids like to talk to their toys, it’s not uncommon. As far back as I can remember, like many children, I’d play with toys and do voices for them, or ask them questions on behalf of other toys, playing out … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Would You Buy Your Kids A “Hello Barbie” Doll?

Survey Says 80% of Security Risks are Users

Bromium surveyed 100 security professionals to see what they thought their biggest security risk was. Through my own research, I have found that the best way to give security awareness training, is NOT this way, with one time security awareness … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Survey Says 80% of Security Risks are Users

Digital Home Privacy Invasion

According to HP’s report on the Internet of Things, there will be 25 billion connected things (that’s a technical term) by the year 2020. On the way to the year 2020, as we walk this crazy road, we keep finding … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Digital Home Privacy Invasion

Is that a Mouse in your Pocket or?

You ready to bring unauthorized hardware on my ‘secure’ network? Mouse-box, the computer in a mouse, is still in prototype. All we know right now is that it is running ChromeOS or Linux. Maybe a variant of Kali will work too. … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Is that a Mouse in your Pocket or?

Smartwatch to Smartphone Data Interception

Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Smartwatch to Smartphone Data Interception

Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99

“With just a mobile phone we created a POS terminal that could read a card through a wallet,” explains Martin Emms, from the NewCastle University research team during the 2014 ACM CCS Conference held in the city of Scottsdale, Arizona, … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99

Mid-year 2014 Data Breaches Exposed

2014 is going to replace 2013 as the highest year on record for exposed records, according to Risk Based Security. Mid-year 2014 at a Glance … • There were 1331 incidents reported during the first six months of 2014 exposing … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Mid-year 2014 Data Breaches Exposed

PRINCE2 Risk Management

22 minutes of your time and you will learn PRINCE2 Risk Management.

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on PRINCE2 Risk Management

The Ponemon Institute’s Data Breach Study

In my opinion, the Ponemon Institute’s Cost of Data Breach Study is eye-opening. If you use a GRC tool that associates dollar amount loss per record, you should probably read this report and make the necessary changes. Increasing the cost … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Ponemon Institute’s Data Breach Study