Increasing use of IT in defense establishments is exposing them to the risks from cyber attacks. Alongwith conventional forces such as Army, Air force and Navy it is time that countries look at Cyberspace. A recent news article explains how the US defense was subject to malware attack from a flash drive. Continue reading “Malwares threats for Defence Establishments”
Secure your wireless router before it is too late
Most of us use wireless routers at office and home. While the office routers are generally secured (hopefully), most home routers are provided by broadband operators wih default configurations and passwords. In a worst case it may happen that these are set as unsecured. There is increasing risk of an intruder using an unsecured network or hacking into a home wireless network and sending out malicious mails. Continue reading “Secure your wireless router before it is too late”
Data Breach Involving Financial Data
Financial Institutions have always been highly susceptible to data breaches and as per indicators the first half of 2010 has not been any different. Already 39 breaches have been reported by Financial Institutions, and considering that reported breaches form a tip of the iceberg in relation to total breaches, actual breaches are expected to be significantly higher. Continue reading “Data Breach Involving Financial Data”
Banks responsible for hacked customer accounts
A recent ruling by consumer court in Mumbai, India has held the bank responsible if it has not complied with regulations and the account holders money is fraudently transferred. Continue reading “Banks responsible for hacked customer accounts”
Recent Phishing Scams
Recent Phishing Scams
Over the last few months, financial institutions have seen a varying profile of phishing attacks. Two interesting instances are reproduced below Continue reading “Recent Phishing Scams”
Smart Phones – Convenience or Threat?
The use of smart phones to access sensitive corporate information away from the office is creating huge security gaps for enterprises. Smart phones are being used to access company mails and applications. Atleast one major breach involving theft of application code has been attributed to malware from smart phones. So how do we benefit from the technology while addressing the risks Continue reading “Smart Phones – Convenience or Threat?”
Responding to Authentication challenges in Online Banking
Traditional authentication mechanisms for online banking have been password and/or a one time password from a dedicated token. Variants or a combination of these two authentication types have been deployed by most banks across the globe. Increasingly these traditional customer authentication methods are being challenged and defeated. Continue reading “Responding to Authentication challenges in Online Banking”
Securing the Network Printer
Network Printers are so commonly used that they are no longer considered computing accessories but more as office appliances. At first thought, applying security to network printers may seem superfluous and unnecessary. But Printers today are complex network devices that require careful consideration regarding security. Continue reading “Securing the Network Printer”
No Work No pay? Time to change the rules
In what is nearly comical for the type and nature of incident, telecom giant Avaya paid salary to an employee who never worked. Investigations reveal that it was a simple case of not deleting the name from payroll file. Continue reading “No Work No pay? Time to change the rules”
Economic Value of a threat
Is it sufficient to just benchmarks threats based on CVSS ratings or do we need to do something more to actually understand the threat better Continue reading “Economic Value of a threat”