Category: hacks

An example of a clear and concise incident report

This incident report from the Australian National University is definitely worth a read, both as an interesting look into the mechanics of a systems compromise…

Continue Reading

WordPress wants sites to eat their (patching) vegetables

Apparently. over a third of the web sites on the Internet (including this one) run the WordPress content management software package. Natch, this makes WordPress…

Continue Reading

So your third party has been breached…

Another day, another third party security compromise story… this time it is Indian outsourcing giant Wipro. The firm has confirmed that a small number of…

Continue Reading

Grindr and US national security

Here’s an interesting development…the US federal agency which reviews foreign investments in US companies has ordered a Chinese firm to sell its stake in gay…

Continue Reading

Bad biometrics: Samsung’s new S10 phone

When biometrics work properly, they can provide you with an easy to use security solution with a reasonable level of assurance for most types of…

Continue Reading

The (not paranoid enough) Android

The train wreck that is Android security continues… A new strain of malware by security firm Wandera found in China has the following charming characteristics,…

Continue Reading

Beware of mobile number port out scams!

I spend a lot of time telling people to use two factor authentication on their important web accounts.  This may explain why I don’t get…

Continue Reading

The ultimate outsider threat?

I know I have been blathering on about insider threats lately, so let’s go to the other extreme – the ultimate outsider threat. A pair…

Continue Reading

Insiders on the outside

Homeland Security Magazine has a very interesting case study on an insider threat case involving DirecTV.  In this case, the insider was a sort-of third…

Continue Reading

Leaky buckets and acquisition best practices

There are three interesting things for CSOs to think about in this story on a leak of passport and other personal information on tens of…

Continue Reading