Archive - Cybersecurity RSS Feed

9 Steps To The Target Hack

TargetStore.jpgBlack Friday 2013 was the beginning of a crazy shopping season for consumers and hackers alike.

Consumers snapped up holiday shopping deals across the retail spectrum and hackers snapped up the data from credit card magnetic strips. A good time was had by all.

Security experts have now begun to piece together the identities and methods of the actors behind the Target breach.

The stolen data began popping up for sale in black market underground chat rooms almost immediately, just like fresh caught fish that needs to be purchased and consumed it before it begins to stink!

Fearless former Washington Post columnist Brian Krebs, was the first to report on the breach. Krebs has been infiltrating and reporting on criminal activities in underground online chat rooms since 2005.

According to Krebs:

“Key information that informs some of my best scoops is just as likely to come from people actively engaged in cybercrime as it is industry experts working to fight fraud. So, once again, a sincere thank you to all of my readers — lovers and haters alike.”

The investigators’ reports are in. I’m a risk management guy, not a computer engineer so here’s a layman’s list of 9 steps revealing: “How the attackers did it”. Continue Reading…

Why Cyber Threats Will Grow In 2014

speedometer of the new yearHoping for a brighter, more profitable 2014? Cyber crooks are too!

But despite growing security awareness in businesses and at home, experts predict that we’re in for an even larger privacy battle in 2014.

As the recent Target data breach (and the subsequent flooding of personal data onto the internet black market) is proving, cyber attacks are BIG business.

Steve Wexler is a technology and security journalist at IT-TNA (IT Trends & Analysis). In a recent article published in PC World magazine, Wexler commented: “One would expect doom and gloom forecasts from security vendors – and IT industry analysts – and you won’t be disappointed.

In his IT-TNA blog, Wexler cites fear as one of the contributing factors for increased vulnerability: Continue Reading…

Fighting Scary Cyber Threats

PumpkinThis is that time of year when we turn to fall sweaters, football and pumpkin pie.

Its also time to get off the couch for a moment and recalibrate our Cyber security awareness meter. The bad guys are out in force and they are organized, ruthless and hungry.

They attack on every front and in every sector. Industry, government, large businesses, small businesses, students, families or any target connected to “the grid” is open game.

Once again, the Department of Homeland Security kicked off their annual Cyber Security Awareness Month to help raise awareness in this cyber community we have all become attached to and somewhat dependent upon.

“Everyone has to play a role in cybersecurity. Constantly evolving cyber threats require the engagement of the entire nation — from government and law enforcement to the private sector and most importantly, the public. Cyberspace is woven into the fabric of our daily lives and the world is more interconnected today than ever before. We enjoy the benefits and convenience that cyberspace provides as we shop from home online, bank using our smart phones, and interact with friends from around the world through social networks.” Continue Reading…

3 Reasons To Care About CISPA

CapitolDomeAny current legislation being debated in Congress which affects the handling of our private information, deserves attention.

The Cyber Intelligence Sharing and Protection Act (CISPA) has recently passed the House and now awaits Senate approval. Under the provisions of CISPA, U.S. companies could hand over all of your private data  to the government, all in the name of national defense.

This information sharing would be done in the interest of “national security” and the justification for CISPA, is to help our government fight back against foreign hackers like China and Iran.

According to US News and World Report:

“A very long list of major companies – including AT&T, Verizon, Intel, HP, Time Warner Cable, IBM, Comcast, McAfee, Oracle, Google and Facebook – like CISPA because it lets them off the hook. So when Anonymous called for a blackout to protest CISPA, it fell on deaf ears to the big tech, Internet and cable companies responsible for vast swaths of the Internet.”

Three reasons you should care: Continue Reading…

3 Cybersecurity Resources For Parents

My wife and have always looked for creative and effective ways to keep our family safe.

Although the internet offers a world of opportunities for people of all ages, it can be a very dangerous place for kids especially.

The following article includes three informative and relevant online resources for parents. This was originally written and posted by Nikki Junker at the Identity Theft Resource Center blog. It is reproduced here with permission.

There was a time when every parent knew what to tell their children to be safe. Children knew not to take candy from strangers, or go swimming right after eating. These days the rules have all changed and children have a new playground on which they must be trained in order to stay safe.
The cyberworld takes up a huge amount of children’s time and, unfortunately, is very dangerous. Sitting a child down and explaining to them about protecting their private information online or staying away from child predators is not easy. Here are some fun ways to teach your child cybersecurity. Continue Reading…