Snapchat is a hip and happening mobile app, and you’ve probably heard of it, though not necessarily in flattering terms if you are interested in security.
Continue reading “Privacy lenses pointed at Snapchat for making phone number searches too easy”
Top 5 ATM Scams
With the new year around the corner, we decided to get into the spirit of things and come up with our Top 5 List. Here goes our Top 5 ATM Scams List.
Continue reading “Top 5 ATM Scams”
Protect against Identity Theft
Identity theft is, well, theft of your identity. Protect against it by safeguarding your identity. Thank you. The End.
Now, did that even qualify as a blog? It did say things that were correct, but made no sense to anyone. So, yes, it qualifies.
Continue reading “Protect against Identity Theft”
Some Critical Success Factors for a Business Continuity Initiative
Business continuity initiatives should be able to meet management and customer expectations in case of a disaster. Here are some pointers to help you towards that goal:
Continue reading “Some Critical Success Factors for a Business Continuity Initiative”
Passwords are passe?
We are all used to passwords as the de-facto authentication..recent news is suggesting its time may be up Continue reading “Passwords are passe?”
KPMG red-faced after being found with data leak
Sensitive data has been found on KPMG’s website soon after the consultancy released a report revealing blue chip companies doing the same.
Security researcher Robin Wood found 400 email addresses, 164 users and 112 PC names along with printers, software versions and “quite a lot of internal directories” on the US KPMG site.
via https://news.hitb.org/content/kpmg-red-faced-after-being-found-data-leak
How To Build Your Own CSI Forensics Lab
If you’ve been waiting for the right handbook to come along and tell you how to build your own forensic laboratory, keep waiting. The National Institute of Standards Technology (NIST)’s new edition of the “Forensic Science Laboratories: Handbook for Facility …
via https://feeds.wired.com/c/35185/f/661467/s/2f057b2a/l/0L0Swired0N0Cthreatlevel0C20A130C0A70Cnist0C/story01.htm
Hacking Google account through Locked Android Devices
via https://thehackernews.com/2013/07/hacking-google-account-through-locked.html
ISACA updates IS Audit and Assurance Standards
ISACA has issued revised Information Systems (IS) Audit and Assurance Standards. The standards have an effective date of 1 November 2013.
Introduced in 1988, the IS Audit and Assurance Standards Read original article at Net-Security
Mobile Phone Flaw Opens 500m SIMs To Hackers
A flaw has been discovered in the security of 500 million mobile phones that could them vulnerable to attack, cyber researchers have said.
via https://www.topix.net/tech/computer-security/2013/07/mobile-phone-flaw-opens-500m-sims-to-hackers?fromrss=1