The most recent content from our members.
My teenage daughter thinks my technology job in security is boring most of the time (especially when I talk about it in front of her)- but when she heard about the SnapChat breach, I quickly received a call asking for advice. The user names and phone numbers of many users were breached and exposed. So should my daughter…
The largest population of the world, China, woke up last Sunday (25th August, 2013) to the most colossal distributed denial of service (DDoS) attacks to have rattled the Chinese digital age. With over 8 million websites affected[1] on .cn domains, the government has condemned this incident and dubbed it the biggest ever…
I know, I'm a day late and quite possibly 37 cents short for my coffee this morning, so let's jump in, shall we? Let's start with the Equifax breach. This came up in the Shields Down Conversation Number Two, so, I thought I would invite some of my friends from our security products to join me to discuss the breach from a…
Having a great week at Microsoft Ignite. I love the energy of the crowd, especially on top of the all the major announcements. if you are at Ignite, stop by the booth and say hello. As always, here are some links from the Intertubz that I hope will hold your interest. Enjoy! Blockchain Technology is Hot Right Now, But…
What does Windows Logs tell you? A Windows domain controller generates almost 100,000 event logs per hour, which means that the collective output from a rack full of Windows servers on an average day would more or less fill up the phone book of Austin. These event logs contain vital information such as logon failures,…
Following the Target Store breach last December, eBay has been the next recent victim of data theft. While Target is still dealing with the fallout from its massive data breach, eBay has asked its 128 million active users to change their passwords. One thing that both of these breaches have in common is that when they…
Targeted attacks in general come with an intent to spy on confidential/sensitive business information such as financial information, proprietary product information and so on. Typically, a highly targeted attack like spear-phishing is targeted at an individual or an organization via emails that contain maliciously crafted…
Hackers Steal 2 Million Usernames & Passwords from Social Networking Sites including Google, Facebook, Twitter and LinkedIn This is a whale of a heist. All the social network stalwarts have been outsmarted by hackers. Security experts at Trustwaves SpiderLabs have discovered a trove of 2 million hacked social network user…
As a security admin, you’re always committed to the security and privacy of the users in your network. However, despite your commitment, the fact remains that without comprehensive monitoring in all the right areas, your network will still be prone to targeted attacks. The Opera Security Breach The recent incident at The…
If you’re a security practitioner, you should be reading this. The 2013 Data Breach Investigations Report (DBIR) has published some alarming statistics that question us on our preparedness to combat new-age security attacks. The speed and sophistication of today’s attacks and new threat vectors being introduced are causing…
It looks like you're new here. Sign in or register to get started.