Over the past few years, the personal data theft landscape has changed as online behaviors and activities evolve. Online shopping is more popular than ever, businesses are storing sensitive information in the cloud and 16 minutes out of every hour spent online is spent on a social network. As consumer habits have changed, so have cyber criminals’ strategies. Personal data is widely available and it gets into the wrong hands, the aftermath can be hugely detrimental to the victim. Read the rest of the article @ Help Net Security
Arbor Networks’ Security Engineering and Response Team (ASERT) has discovered a denial-of-service tool specifically designed to target the U.S. government’s healthcare enrollment marketplace, Healthcare.gov. Healthcare.gov is established by the Affordable Care Act (ACA) in the United States, perhaps better known by the neologism “Obamacare.” The ACA is considered by many to be U.S. President Barack Obama’s crown achievement, aiming to provide health insurance to millions of uninsured American citizens. The rollout of the website that supports the ACA has been marred by a seemingly endless and humiliating array of technical problems. Read More – Threatpost
You know you shouldn’t post potentially damaging data on Facebook, but more often that not, your friends don’t think twice about it, and this can impact you even more than you think. At the Hack In The Box conference in Kuala Lumpur, security consultants Keith Lee and Jonathan Werrett from SpiderLabs revealed how a simple tool can enable anyone to find a comprehensive amount of data on any user. To get the information, they created the aptly named FBStalker. This tool reverse-engineers the Facebook Graph and can find information on almost anyone. You don’t have to be a friend with someone on the network – the only thing that FBStalker needs to work is for parts of your posts to be marked as public. The […]
Beginning Jan. 8, Yahoo will enable encryption by default for users logging into its Web-based mail service, the company has told The Washington Post. – Source WOW why in the world did it take Yahoo so long to do this?
Search The Security Pub
Active Directory Adobe Adobe Hack Android Anti-Malware Apple Best Practices Breach Data Breach Documentation Facebook Google Guidelines Information Security News Internet ios ipad iphone Java 7 Java Security Patch Malware Malwarebytes Man in The Middle Attacks Microsoft Mobile Security MS Hotfixes Oracle passwords Phishing Polls PowerShell Command Privacy security Security Groups Security Policies Security Policy Smartphone Software SSL Standards Tablet VBScript Vulnerabilities Vulnerability Web Security
Logging and Log Management
Author: Anton Chuvakin