Earlier this year, Forbes reported how a banking Trojan called Triada had been found on a bunch of brand new budget Android smartphones. Google has now confirmed that threat actors did, indeed, manage to compromise Android smartphones with the installa…
The notorious Magecart malware, that blights online stores by stealing payment card details from unsuspecting shoppers at checkout, has claimed another high profile victim.
Read more in my article on the Tripwire State of Security blog.
Drum full of backup tapes The trade press is filled with stories about companies getting into big regulatory trouble over lost backup tapes . The tricky part is that usually, one reason companies use backup tapes is the ability to archive backup tapes off-site for extended periods of time. Terabytes by […] Source: http://www.forbes.com
VideoIt is time for a more consumer oriented blog post with a couple of hints about what to watch out for during the holiday online shopping season. How do you watch out and tell who is naughty and nice online? You better check twice or you better not cry if […] Source: http://www.forbes.com
The “Section 8 Bible”, a must read book for aspiring landlords, introduces a simple rule to deal with broken equipment in the apartment: If law does not require it, remove it. Don’t fix it. For example, interior doors are not necessarily required and can be removed. Network security professionals frequently […] Source: http://www.forbes.com
Thomas Edison, in 1882, opened a power station on Pearl Street in New York city to supply the densely populated Manhattan island with DC power . DC was the logical power distribution standard at the time. Easily generated and safely distributed across the limited geographic area it was intended to […] Source: http://www.forbes.com
Since 9/11, the company has been as prepared for a disaster crisis as government first responders. Source: http://www.forbes.com
Children’s social security numbers are a ripe crop for cybercriminals. Source: http://www.forbes.com
After 40 years, DNS is about to get security. What took so long? Source: http://www.forbes.com
Information security needs to take the same statistical approach to analyzing its performance as the aviation industry. Source: http://www.forbes.com