Identity theft is, well, theft of your identity. Protect against it by safeguarding your identity. Thank you. The End.
Now, did that even qualify as a blog? It did say things that were correct, but made no sense to anyone. So, yes, it qualifies.
Continue reading “Protect against Identity Theft”
PCI DSS Version 3.0 Released
PCI Security Standards Council (PCI SSC) has recently released Version 3.0 of the PCI Data Security Standard (PCI DSS) and Payment Application Data Security Standard (PA DSS). Organizations have one year (till December 31, 2014) to become compliant with the new standard.
Continue reading “PCI DSS Version 3.0 Released”
“Man-in-the-e-mail” Scam
FBI’s Seattle division has warned of a new kind of attack nicknamed “man-in-the-e-mail” with reference to the more well known “man-in-the-middle” attacks. According to an FBI notification, this attack has affected 3 companies in the Seattle area of Washington.
Continue reading ““Man-in-the-e-mail” Scam”
Drone Delivery! Open your window!!
Amazon’s CEO Jeff Bezos unveiled a grand plan (or a high decibel PR stunt perfectly timed to co-incide with the start of American holiday shopping season, if you like) to use unmanned drones, dubbed Amazon Prime Air, to deliver goods to customers within 30 minutes of ordering online.
Continue reading “Drone Delivery! Open your window!!”
Web app security: not rocket science
A web presence is mandatory for all but the smallest businesses. Yet at the same time web sites are the biggest and one of the easiest targets for hackers: they are notoriously fraught with vulnerabilities. Information Week and Dark Reading offer a few strategies to help you deal with this dilemma.
via https://www.cmo.com.au/mediareleases/17977/web-app-security-not-rocket-science/
Evolution of Attackers-for-Hire
The emergence of attackers-for-hire is a troubling trend in cybercrime, and one particular group is changing its techniques to gain access to computer systems, says Symantec researcher Kevin Haley.
via https://www.bankinfosecurity.com/evolution-attackers-for-hire-a-6252/op-1
Enterprise Risk Management – Benefits
At what level should ERM be integrated with business processes – this is a dilemma that many organizations face when implementing an ERM.
Continue reading “Enterprise Risk Management – Benefits”
Banks to choose between EMV & Aaadhar
RBI has issued a circular on 26 November, 2013 regarding security of card present transactions. Banks may now take a decision on whether to use EMV chip and PIN technology or use Aaadhar cards as an additional factor of authentication for securing card present transactions.
Continue reading “Banks to choose between EMV & Aaadhar”
ISO 27001:2013 vs 27001:2005
ISO 27001 is a specification for an information security management system (ISMS). Organisations which meet the standard may be accredited by an independent accreditor. ISO 27001:2013 is a new standard that was published on 25, September, 2013.
Here is a short FAQ on the new standard
Continue reading “ISO 27001:2013 vs 27001:2005”
Facebook Requiring Password Resets in Adobe Aftermath
The tentacles of the massive Adobe breach, called one of the worst in U.S. history by one security expert, have reached Facebook users, specifically those who used the same email and password combination for the social network as well as Adobe.
via https://threatpost.com/facebook-requiring-password-resets-in-adobe-aftermath/102918