Blogs

Showing Blog Posts: 11–20 of 134 tagged Cybercrime

  • Vulnerability Management Helps Law Enforcement Investigate Cybercrime

    by Christopher Burgess on July 30, 2014

    Have we had a day in recent memory when cybercrime was not part of the global news cycle? According to a newly released report from RSA, over 50 percent of phishing attacks in March 2014 targeted brands located in the United States, United Kingdom, India, Australia, and Canada; an April 2014 RSA report reviewing 2013 data noted phishing caused $5.9 billion in losses to global organizations that…

  • Government Security and InfoSec: Perfect Together?

    by Joshua Marpet on July 11, 2014

    Besides the white hat/black hat divide implicit within the world of InfoSec, there is another divide of mindsets—that of the corporate InfoSec individual and the government security individual. Their career paths are similar: They go to school, learn on the job, and hang out at conferences and user-group meetings. They decry the problems that software developers put in their paths and…

  • Keeping Private Data Private: Tips and Tricks

    by Joshua Marpet on July 4, 2014

    Companies produce data. Some of it is public data, some private data. The classification of data into public and private is important, but right now, the means to keep data private is incredibly important as well. Keeping data private is a process. It starts with examining the use cases for the data. Is this piece of information going to be used every day? Or does it just need to be stored in…

  • Cyber Crime, Security and Digital Intelligence

    by Ben Rothke on June 30, 2014

    Cyber Crime, Security and Digital Intelligence by Mark Johnson is a high-level introductory text to information security. The books 12 chapters cover the following topics: Threats to key sectors Cyber security fundamentals Cyber-attack fundamentals Organized cyber attacks Cloud risks Web 2.0 risks Cyber security threat actors Common vulnerabilities Cyber security control frameworks Cyber security…

  • Losing Faith with Retail POS?

    by Christopher Burgess on May 28, 2014

    The technology section of every newspaper, magazine or online entity lately is describing how point of sale (POS), and the use of your credit cards is a bit like playing Russian roulette with the retail POS terminals — are they or are they not compromised? The recent batch of retail breaches of payment card industry (PCI) data began with Target, then Neiman Marcus, Michaels, and a bevy of…

  • Mobile Devices, Cyber Attacks, and the New Frontier

    by John Linkous on May 26, 2014

    As the unrelenting game of attackers versus defenders continues in the world of information security, mobile cyber attacks are becoming a more desirable attack vector for hackers, criminal organizations, and nation-states to gain access to data. The past few years have started to see long-term, concerted campaigns targeting mobile devices, most notably the Red October malware that targeted…

  • Breaches: When You're Caught With Your Britches Down

    by Christopher Burgess on May 19, 2014

    Head over to the search engine of your choice, put in the keywords "data breach," and take a look at the screen. The very first thing you'll encounter is the new cottage industry that has evolved around rectifying the residual fallout that accompanies many breach events. You'll discover that there is no shortage of paid ads offering various solutions. Then you'll see the multitudes of vendors…

  • Two new basics books from Syngress

    by Ben Rothke on May 13, 2014

    Syngress has a number of basics guides; meant to quick get the reader up to speed. In The Basics of Web Hacking: Tools and Techniques to Attack the Web and The Basics of Hacking and Penetration Testing, Second Edition: Ethical Hacking and Penetration Testing Made Easy, authors Josh Pauli and Patrick Engebretson provide the reader with a quick and dirty overview of the topic, and enough tactical…

  • Windows XP: The COBOL of the 21st Century

    by Joshua Marpet on April 21, 2014

    What happened when Windows XP went into end of life (EOL)? That fateful day happened on April 8, 2014. It doesn't mean that WinXP computers will suddenly stop working. It doesn't mean that the world of WinXP computing will end. To be honest, it probably doesn't even mean that WinXP-based programming will end. So what does it actually mean? New drivers won't be developed. It will get increasingly…

  • Privacy in the Age of Ubiquitous Computer Vision

    by Joshua Marpet on April 17, 2014

    With Google Glass, cell phone cameras, hidden cameras, and ever cheaper surveillance cameras, can there truly be user privacy? With Google Glass and facial recognition apps, tagging people can happen at full walking speed, without a pause or possibility of the action being recognized. Is there any parallel in other realms? At one point, a car with an expired registration would only get exposed…

This document was retrieved from http://www.rsaconference.com/blogs on Wed, 17 Dec 2014 23:00:56 -0500.
© 2014 EMC Corporation. All rights reserved.