Need Assistance? Call us at (512) 814-8044, or submit a ticket

Why We Should Thank, Not Demonize LulzSec, Anon

So the 50-day cruise is over and the guys at LulzSec are going back underground. That should worry some of us because if they did not want us to know what they were doing, I don’t think any sane person would argue that they could not have done so.

While the media has been abuzz about the exploits of Anonymous and LulzSec, the bigger question we should be asking is, are any of their exploits new or did they just give us a wake up call that there is no security, at least in the way we normally define it. What they have demonstrated is that security is a term we use to make ourselves feel good. (more…)

Share

Comments Off on Why We Should Thank, Not Demonize LulzSec, Anon

The RSA Breach: Time for Full Disclosure?

As more companies with national security interests come forward with admission of breaches related to the hacking of RSA’s SecurID technology, one wonders if it is time for RSA to break its stubborn refusal to tell the public what exactly was stolen or when the breach actually occurred. At this stage, it is not just enough to tell the public that it had been hit by a phishing email exploiting a zero-day vulnerability in Adobe Reader. (more…)

Share

Comments Off on The RSA Breach: Time for Full Disclosure?

Encryption Tools for the Mobile Executive

Most companies provide their senior executives with laptops or netbooks and tablets so they can be productive even when on the road. This is even more true of corporate executives who sometimes demand anytime, anywhere access to data residing on corporate servers. The big corporations can afford to spend millions of dollars on data protection hardware and software.

The same cannot be said of executives in small and medium-sized organizations, especially when it comes to loss of personal information, including credit card data, patient records or other financial information, stored by the company. Data breaches happen and information is lost every day due to small mistakes that could have been avoided. For small businesses, these events can be devastating. (more…)

Share

Comments Off on Encryption Tools for the Mobile Executive

Breaching the Bastille: When Security Vendors Get Hacked

The recent rash of exposures about successful attacks against information security vendors may come as no surprise to a lot of people in the information security world who probably see or hear about it frequently, but it will surely come as “shocking” to most “ordinary” folks.

HBGary, RSA, Comodo and Barracuda Networks are the latest of high-profile security vendors to be breached. As a quick refresher, EMC’s RSA group disclosed that someone had broken into its networks and obtained information that could compromise its SecurID products. (more…)

Share

Comments Off on Breaching the Bastille: When Security Vendors Get Hacked

Beware The Ides of April: Web Indexing and Tax Data

Tax season is in high gear and with it comes the need to be extra vigilant on how tax records are handled. After all, your tax records “has everything” that can be considered as Personally Identifiable Information (PII). PII refers to information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual.

Stephen Chapman over at ZDNet observed that as of 4/10/2011, there were over 50 tax documents containing any given combination of Social Security numbers, credit card information, names, addresses, tax IDs, and phone numbers being made available online. (more…)

Share

Comments Off on Beware The Ides of April: Web Indexing and Tax Data
Close Menu
Share
Share