Blog

Blog

'Breaking Bad' Ransomware Targeting Australian Computers

A security firm has observed that a new type of crypto ransomware whose theme is styled around the popular television series Breaking Bad is targeting Australian computers. In a post published on its Security Response blog, Symantec discusses how the ransomware incorporates several elements from Breaking Bad, which premiered in 2008 and aired its...
Blog

Computer Criminals Brought to Justice – Valérie Gignac

Last week, we explored the story of Konstantin Simeonov Kavrakov, a Bulgarian who hacked Bill Gates’ bank account and stole thousands of dollars. We now report on the story of Valérie Gignac, a Canadian woman who is believed to have hacked users’ webcams and subsequently harassed them. According to a statement published by the Royal Canadian Mounted...
Blog

C-Level Executives and the Need for Increased Cybersecurity Literacy

Now more than ever, it’s evident cybersecurity risk oversight at the board level is essential to keep any business or organization afloat – and off the headlines. However, despite the abundance of data breaches and high-profile cyber attacks, C-level executives still lack understanding of these cyber risks, as well as confidence in their...
Blog

Millions of WordPress Websites at Risk from in-the-wild Exploit

What's happened? A widespread vulnerability has been found in WordPress, that impacts millions of websites running the popular blogging software and content management system. What's the vulnerability? It's a cross-site scripting (XSS) vulnerability inside the popular JetPack plugin. and the default Twenty Fifteen theme installed on all WordPress...
Blog

Six Steps to Protect Your SMB Against a Data Breach

The number of data breaches increased 27.5% in 2014, making measures against these types of security incidents increase significantly among large companies. What about small businesses? Do they really stand a chance against hackers and security incidents? Being a small company might make you think no hacker will bother stealing your data. But, just...
Blog

Top 10 Information Security Conferences

Recently, we compiled a list of the top 10 highest paying jobs in information security in an effort to help individuals navigate this exciting field as a career choice. That being said, we would be remiss if we stopped there. Information security is continuously evolving, so knowing which events offer the best opportunities for learning new ideas...
Blog

Why You Need a Disciplined Response to Digital Forensics

With acceptance that the prospect of unauthorised incursion, hacks and/or compromise of corporate, and personal systems is to now be expected, it would seem to make good sense to accommodate mechanisms with which the organisation may respond to such manifestation as and when they are encountered. It is this awareness which is driving many reputable...
Blog

Stop Sending Me Threat Intelligence in Email

I've been talking to many different organizations recently about their sources of threat intelligence, and one thing I've heard numerous times is that some of the most timely, valuable threat intelligence they are receiving is via email. I’ve even heard that we’ve made some progress with STIX, as sometimes STIX content is attached to the emails...
Blog

Computer Criminals Brought to Justice – Konstantin Simeonov Kavrakov

Last week, Tripwire explored the story of Austin Alcala, a teenager who penetrated a number of American videogame corporations and the United States military as a member of an international hacking group. We now report on the story of Konstantin Simeonov Kavrakov, a Bulgarian hacker who is responsible for having infiltrated Bill Gates’ bank account...
Blog

Top Critical Skill In Information Security: Be Humble

"The more I learn, the more I realize how much I don't know.” – Albert Einstein Being involved in information security is intimidating. Not just because you are dealing with complex technology with serious implications if you fail, but everyone around you is going to be smarter than you. Even your adversaries. Especially your adversaries. Get...
Blog

Hard Rock Casino Credit Card Breach Undetected for 7 Months

The Hard Rock Casino in Las Vegas has been hit with malware leading to the compromise of credit card data, names and addresses at restaurant, bar and retail locations. The compromise did not affect the hotel or casino transactions. At this time, no details regarding the specific malware or other specifics regarding the compromise were provided....
Blog

FBI Assists Rutgers University Investigate Second DoS Attack in a Month

The Federal Bureau of Investigation (FBI) is assisting Rutgers University investigate the source of a second targeted attack that has crippled the university’s Internet in the past month. “The Federal Bureau of Investigation is assisting the university with its search,” agency spokeswoman Celeste Danzi explained on Wednesday. ...
Blog

RSA 2015 Keynote: Don't Be Afraid of the Bumps in the Night

Thirty thousand people; five hundred vendors; a clan of security practitioners seeking out safety in their ecosystem; a tribe of knowledge pursuing the opportunity to share best practice and thought leadership to increase likelihood of survival... my first RSA. Amit Yoran’s Keynote suggests that an evolution out of the Dark Ages of Security is...