Top Shelf Retailers are Not Immune from Breaches
Attackers are not going to go through the effort of researching and conducting recon on a target, attempting various techniques to compromise the system, and exfiltrate valuable data. The risks are simply too much. If the person or group is caught, there are serious and significant repercussions. Saks Fifth Avenue and Lord & Taylor have discovered this the difficult way. The time frame for the data theft is not clear. This has been estimated as beginning in May 2017 to March
Android Targeted ... Again!
Cell phones have become an integral part of our daily lives in America. If you forget your phone at home, and remember on the way to work, there is a rather significant chance you will turn your vehicle around, time allowing, and return home to secure it. If you don't have it with you, the chances are good you are very cognizant you don't have it ever ready and present. There is that unnerving feeling of loss until you return home and see your phone and check your messages. W
Cybercrime as an economy not just as a business
A recent study sponsored by Bromium, takes the position that cybercrime is no longer just a business, following corporate business strategies, but should be viewed as an economy. An economy that parallels the legitimate world economy and often intersects with it. The study states that cybercrime now generates at an estimated $1.5 trillion annually. To put that in comparison, the annual GDP of US: $19.4 trillion, China: $11.8 trillion and Japan: $4.84 trillion. Cybercrime is a
Another Restaurant targeted
The attackers are spending a predominant amount of their time looking for new targets and completing recon on these, in order to facilitate a successful attack on the chosen target(s). A familiar target has been the restaurant industry. Their focus historically has been to cook and serve the clientele the dishes which were ordered. The focus is not with networking, InfoSec, or other computer issues, until a piece of the computer equipment breaks. The usual assets targeted for
Insider Threats: Still Not Cheap
The insider threat is a completely viable attack vector, be this an intentional or unintentional act. In a not significant level, there will be the opportunity for an insider to intentionally steal data via email or the thumb drive as they leave from the workday. There are also the unintentional acts of the hapless worker, answering their emails as they should, however with the addition of clicking on a link or picture from someone they thought they knew. The operational effe
InfoSec Apathy: Spreading
InfoSec Apathy: SpreaWe live in such a wonderful era. The technology is growing in complexity exponentially. Moore’s Law seems to be expanding rapidly in its application. Social media reports the news within 15 minutes when a generation ago, this may have taken a day or more to publish. With the good however comes the bad. Although we receive the information so quickly, people have become numb to this at certain levels. One of these areas is InfoSec. There are a mountain of n