General security

How to Plan a Social Engineering Assessment

A social engineering assessment is a very valuable tool in understanding the security exposure of most organizations. Since human beings tend to be the weake

Dejan Kosutic on Business Continuity and Disaster Preparedness

From an organizational point of view, the concept of resilience is basically the same as the concept of business continuity: An organization’s ability to rea

Buyer Beware: Your Credit Card and Debit Card Data Can Be Stolen at the Cash Register

Most adults in the developed world have bank accounts and credit cards. Most of us use debit cards and credit cards at the cash registers of our favorite ret

Introduction to the Business of Stolen Card Data

Introduction I receive many questions from people who don't work in the security field about the use of stolen credit card data in the cyber-crime ecosystem,

Cyber Extortion

Data Held Hostage In the digital age, data has incredible value. Not only for business purposes, but also for criminal intent. It draws the interest of cyber

IT Security 101: Prevent Weak Passwords

Passwords have been part of IT since long before the age of the desktop PC. However, now more than ever, systems administrators need to re-examine their pass

How the NSA Monitors Target Computers with Radar Wave Devices

Introduction Germany's Der Spiegel has published a couple of disturbing articles on the NSA surveillance activities. The media agency has focused its article

2014 - The year of changes

The year 2014 will be a year of continued change in the ICT security world. It will be a year in which some very fundamental, unfinished business that origin

Cyber Security During The Holidays

Introduction It's the holidays, a key time for cybercrime that exploits the bad habits of unaware internet users. Attackers can defraud and monetize their ac

Beyond password length and complexity

(or "Why PCI-DSS-Compliant Passwords Aren't Enough" or "PCI-DSS-Compliant Password Analysis Reveals One-Quarter Still Trivially Compromisable") Thanks t