There are many candidates for this prestigious post but one of the most deserving is Windows XP. When XP and Windows 8 are hit with the same number of malwares, the infection rate of XP is much higher than that of WIndows 8 – maybe even 5-6 times higher.
Continue reading “Weakest link the in Security Chain – Windows XP?”
Handling a Data Breach
Being hit with a data breach is difficult to cope with. Organizations should have a defined set of procedures to follow in case they experience a data breach. Surprisingly, we have not seen any organization have that as a ready reckoner. The human mind always expects bad things to happen only to someone else. So, here is a list of pitfalls to avoid if your organization is the victim of a data breach.
Continue reading “Handling a Data Breach”
Top 5 Breaches of 2013
While 2013 is now behind us, the threat of security breaches is certainly not.
Continue reading “Top 5 Breaches of 2013”
Banks & Underground Card Sites
In response to the recent November-December breach of credit and debit cards at Target stores across the US (and possibly Canada), some Banks in the US have reacted in subtle and clever ways.
Continue reading “Banks & Underground Card Sites”
Employee sends info on 2,000 to personal email address, gets fired
An employee with a private contractor for Colorado Medicaid was fired after sending an email to a personal account that contained sensitive information on almost 2,000 people.
Continue reading “Employee sends info on 2,000 to personal email address, gets fired”
The Target Breach – One of the biggest in US history
Was Target’s breach the result of an insider job? Or was it a network hack? Or was it ….
Continue reading “The Target Breach – One of the biggest in US history”
New Ideas for Mitigating Insider Threat
Presidential Panel Suggests Series of Steps
Continue reading “New Ideas for Mitigating Insider Threat”
Privacy lenses pointed at Snapchat for making phone number searches too easy
Snapchat is a hip and happening mobile app, and you’ve probably heard of it, though not necessarily in flattering terms if you are interested in security.
Continue reading “Privacy lenses pointed at Snapchat for making phone number searches too easy”
Top 5 ATM Scams
With the new year around the corner, we decided to get into the spirit of things and come up with our Top 5 List. Here goes our Top 5 ATM Scams List.
Continue reading “Top 5 ATM Scams”
Big Data and security analytics collide
Big Data – an easily digestible name for the emergence of commodity software designed to allow synchronous N-Dimensional Analytics – quite the mouthful to anyone without a background specialising in the data sciences.
Continue reading “Big Data and security analytics collide”