Skip to content
Qadit Blog

Qadit Blog

Information Security, SSAE 16, ISO 27001, CISA, Cert-IN

Month: December 2013

Posted on December 31, 2013January 1, 2014

Banks & Underground Card Sites

In response to the recent November-December breach of credit and debit cards at Target stores across the US (and possibly Canada), some Banks in the US have reacted in subtle and clever ways.
 
Continue reading “Banks & Underground Card Sites”

Posted on December 31, 2013January 3, 2014

Employee sends info on 2,000 to personal email address, gets fired

An employee with a private contractor for Colorado Medicaid was fired after sending an email to a personal account that contained sensitive information on almost 2,000 people.
 
Continue reading “Employee sends info on 2,000 to personal email address, gets fired”

Posted on December 31, 2013January 3, 2014

The Target Breach – One of the biggest in US history

Was Target’s breach the result of an insider job? Or was it a network hack? Or was it ….
Continue reading “The Target Breach – One of the biggest in US history”

Posted on December 31, 2013January 3, 2014

New Ideas for Mitigating Insider Threat

Presidential Panel Suggests Series of Steps
 
Continue reading “New Ideas for Mitigating Insider Threat”

Posted on December 29, 2013January 3, 2014

Privacy lenses pointed at Snapchat for making phone number searches too easy

Snapchat is a hip and happening mobile app, and you’ve probably heard of it, though not necessarily in flattering terms if you are interested in security.
 
Continue reading “Privacy lenses pointed at Snapchat for making phone number searches too easy”

Posted on December 28, 2013January 1, 2014

Top 5 ATM Scams

With the new year around the corner, we decided to get into the spirit of things and come up with our Top 5 List. Here goes our Top 5 ATM Scams List.
 
Continue reading “Top 5 ATM Scams”

Posted on December 28, 2013January 3, 2014

Big Data and security analytics collide

Big Data – an easily digestible name for the emergence of commodity software designed to allow synchronous N-Dimensional Analytics – quite the mouthful to anyone without a background specialising in the data sciences.
 
Continue reading “Big Data and security analytics collide”

Posted on December 25, 2013January 3, 2014

Protect against Identity Theft

Identity theft is, well, theft of your identity. Protect against it by safeguarding your identity. Thank you. The End.
Now, did that even qualify as a blog? It did say things that were correct, but made no sense to anyone. So, yes, it qualifies.
 
Continue reading “Protect against Identity Theft”

Posted on December 7, 2013January 2, 2014

PCI DSS Version 3.0 Released

PCI Security Standards Council (PCI SSC) has recently released Version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA DSS). Organizations have one year (till December 31, 2014) to become compliant with the new standard.
 
Continue reading “PCI DSS Version 3.0 Released”

Posted on December 3, 2013December 5, 2013

“Man-in-the-e-mail” Scam

FBI’s Seattle division has warned of a new kind of attack nicknamed “man-in-the-e-mail” with reference to the more well known “man-in-the-middle” attacks. According to an FBI notification, this attack has affected 3 companies in the Seattle area of Washington.
Continue reading ““Man-in-the-e-mail” Scam”

Posts pagination

Page 1 Page 2 Next page

Recent Posts

  • Digital Personal Data Protection Act, 2023: An Interpretative Overview for Professionals
  • Implementing Trustworthy AI: A Practical View of ISO/IEC 42001:2023
  • Securing Oracle Cloud Infrastructure (OCI)
  • RansomExx Upgrades to Rust
  • KmsdBot, a new evasive bot for cryptomining activity and DDoS attacks

Recent Comments

    Archives

    • December 2025
    • April 2023
    • November 2022
    • May 2022
    • March 2021
    • December 2020
    • November 2019
    • October 2019
    • July 2019
    • June 2019
    • April 2019
    • March 2019
    • January 2019
    • December 2018
    • November 2018
    • September 2018
    • August 2018
    • July 2018
    • June 2018
    • May 2018
    • April 2018
    • March 2018
    • February 2018
    • January 2018
    • September 2017
    • August 2017
    • February 2017
    • November 2016
    • October 2016
    • September 2016
    • August 2016
    • July 2016
    • June 2016
    • May 2016
    • September 2015
    • August 2015
    • July 2015
    • June 2015
    • May 2015
    • April 2015
    • March 2015
    • February 2015
    • January 2015
    • December 2014
    • November 2014
    • October 2014
    • September 2014
    • August 2014
    • July 2014
    • June 2014
    • April 2014
    • February 2014
    • January 2014
    • December 2013
    • November 2013
    • October 2013
    • September 2013
    • August 2013
    • July 2013
    • June 2013
    • May 2013
    • March 2013
    • February 2013
    • December 2012
    • November 2012
    • October 2012
    • September 2012
    • December 2011
    • November 2011
    • October 2011
    • September 2011
    • August 2011
    • July 2011
    • June 2011
    • May 2011
    • April 2011
    • March 2011
    • February 2011
    • January 2011
    • December 2010
    • November 2010
    • October 2010
    • September 2010
    • August 2010
    • July 2010
    • June 2010
    • May 2010
    • April 2010
    • March 2010
    • February 2010
    • January 2010
    • December 2009
    • November 2009
    • October 2009
    • September 2009
    • August 2009
    • July 2009
    • June 2009
    • May 2009
    • April 2009
    • March 2009
    • February 2009

    Categories

    • Banking
    • Business Continuity & DR
    • ERP
    • Governance, Risk & Compliance
    • Information Technology
    • IT Security
    • IT Security Frauds
    • Microsoft
    • Network Security
    • OS Security
    • Uncategorized
    • website security

    Meta

    • Log in
    • Entries feed
    • Comments feed
    • WordPress.org
    Proudly powered by WordPress