How Does POS Malware Work?

POS malware attack 2

So in the last two years there have been over 400 retail companies, including many big national chains, that have fallen victim to the BackOff or other Point of sale (POS) malware exploits, revealing millions of credit card and customer records.  So how does this exploit work?

My friends at Calyptix Security sent me another article that should be interesting to anyone who is running ...

Continue Reading →
0

Network Switches: Today’s Problems and the Possibilities of the Future

This article was written by guest blogger Richard Thompson.  Richard Thompson works for MilesTek which has been providing complete connectivity solutions since 1981. His goal is to provide relevant information to tech conversations across the Internet.  Richard discusses some common vulnerabilities in network switches that can be exploited by cyber-attackers.

Network switches are the hardworking hardware devices we rely on to connect computer networking devices. With so much emphasis put on developing software to combat attacks (such as ARP Spoofing), ...

Continue Reading →
0

Real Hackers Are Not Evil

The term “hacker” has been used loosely by the news media and in popular culture to refer to people who break into computers and do nasty things on networks.  Nothing could be farther from the truth.

So what is a “hacker” actually.  Last year, I attained a high level security certification that qualifies me as a “Certified Ethical Hacker.”  So I guess that means I might be a hacker.  I can assure you that I am not engaged in any sort ...

Continue Reading →
0

Macro Viruses Make a Comeback

Microsoft Office VBA macro viruses were a pretty powerful exploit back in the 1990’s, but security changes by Microsoft and other security software vendors had pretty much made them moot by 2000.  Surprisingly enough malware writes are giving them a new life by tricking users into disabling macro protection. Here is how it works:

VBA or Visual Basic for Applications is a software language created by Microsoft to allow advanced users to write bits of code called “macros.”  Macros allow a ...

Continue Reading →
0

Cybersecurity–Where Do I Start?

If you have been following this blog for a while, you may find yourself thinking that the time has definitely come to do “something” about cybersecurity in your business.  As a busy and successful entrepreneur, business owner or senior manager you may have no idea where to begin, or where you will find the time to create and implement a plan.  The National Institute for Standards and Technology (NIST) has created a 41 page roadmap for businesses to use in ...

Continue Reading →
0

Are You Providing Guest Wireless Access? Things to Know

One of my favorite reads is Computerworld Daily Shark.  These are stories from the field, provided by IT professionals for the amusement and education of other IT professionals. Most of these stories are real head-slappers, on the order of how-can-they-be-so-dumb.  Basically this is a form of group therapy for those of us in the business; we get to read about situations that are worse than the ones that are driving us crazy in our own professional lives.

The story ...

Continue Reading →
0

Your Home or Business Security System Can Be Hacked

More good news (NOT) from the hacker frontier.  In a talk that is scheduled twin cybersecurity conferences BlackHat (August 2-7. Mandalay Bay Hotel) and DefCon in Las Vegas (Aug 7-10 Rio Hotel and Casino), cybersecurity researcher Logan Lamb will present a demonstration on how home and business security systems are vulnerable to hacking.

The problem lies with the newer wireless security systems.  Wireless window, door, and motion sensors are largely unencrypted, and can be intercepted and spoofed ...

Continue Reading →
0
Page 170 of 216 «...140150160168169170171172...»