Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Over One Billion Served →

February 17, 2015 by Marc Handelman in All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Suprised by the largest heist in history? Concerned about Carbanak APT? Clearly, proof-positive that advanced persistent threats are deeply evil - and highly efficient when coupled with other complimentary and stealth-like methodologies (aka Hiding in Plain Sight). Read on...

February 17, 2015 /Marc Handelman
All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Government of Canada, Data From Canada Mandated To Remain In Canada →

February 02, 2015 by Marc Handelman in All is Information, Common Sense, Commerce, Compute Infrastructure, Data Loss Prevention, Cryptography, Database Security, Data Security, Encryption, Enterprise Management, Government, Information Security, Security Governance, Canada

Dr. Michael Geist (Law Professor at the University of Ottawa, and the current holder of the Canada Research Chair in Internet and E-commerce Law) holds forth on current cloud cogitation up north (at least within the data confines of the Government of Canada / Gouvernement du Canada).

 

February 02, 2015 /Marc Handelman
All is Information, Common Sense, Commerce, Compute Infrastructure, Data Loss Prevention, Cryptography, Database Security, Data Security, Encryption, Enterprise Management, Government, Information Security, Security Governance, Canada

Supercalifragilistic Reidentifiability →

January 31, 2015 by Marc Handelman in All is Information, Computation, Computer Science, Data Security, Database Security, Information Security, Information Sciences, Intelligence

Well documented paper on the capability to identify entities via credit card metadata [i.e., the identification is based on what was once thought to be anonymous big data...]. Time to move back to currency transactions. Tout Simplement Incroyable.

January 31, 2015 /Marc Handelman
All is Information, Computation, Computer Science, Data Security, Database Security, Information Security, Information Sciences, Intelligence

DeepFace and the End of Privacy

January 30, 2015 by Marc Handelman in All is Information, Computation, Computer Science, Data Security, Database Security, Demise of Privacy

In a new series (typically, behind Science Magazines' pay-wall, but free access to February 5th, 2015), comes this particularly disturbing revelation of Facebook Inc.'s (NasdaqGS: FB) DeepFace system which is now, apparently,  as accurate as human's at facial recognition.

January 30, 2015 /Marc Handelman
All is Information, Computation, Computer Science, Data Security, Database Security, Demise of Privacy

Turn's Undead Cookie

January 24, 2015 by Marc Handelman in All is Information, Data Security, Database Security, Demise of Privacy, Information Security, Intelligence

In a posting published by ProPublica, online advertising leviathan TURN is utilizing the dreaded zombie cookie, pioneered by those friendly folks at Verizon Wireless. ProPublica is also reporting that TURN's actions were originally discovered by Stanford University computer scientist and attorney Jonathan Mayer, and then tested by ProPublica staffers.

 

January 24, 2015 /Marc Handelman
All is Information, Data Security, Database Security, Demise of Privacy, Information Security, Intelligence

Criminalization of Cryptography →

January 21, 2015 by Marc Handelman in All is Information, Cryptography, Cybernetic Crime, Database Security, Data Security, Information Security, Intelligence, National Security, Network Security

If you read anything today about cryptography today, read the work of Stanford University's Center for Internet and Society's Jeffrey Vagle, JD  [Mr. Vagle is also a Lecturer in Law and the Executive Director of the Center for Technology, Innovation and Competition [CTIC] at the University of Pennsylvania Law School]; in which, Mr. Vagle examines the criminalization of cryptography [snippet of his work appears below].

'We've heard this story from governments before, of course, from the "crypto wars" of the early 1990s to recent claims by the FBI that encryption allows networks to "go dark," and prevent legitimate law enforcement efforts. But as the leaked security memo asserts, without strong crypto and secure networks, we're all put at greater risk. It is crucial that we keep this in perspective as the world's legislative bodies rush to do something--anything--in the face of these crises.' - via Jeffrey Vagle writing at the Center for Internet and Society, at Stanford University
January 21, 2015 /Marc Handelman
All is Information, Cryptography, Cybernetic Crime, Database Security, Data Security, Information Security, Intelligence, National Security, Network Security

Defectum Securitas →

January 06, 2015 by Marc Handelman in All is Information, Common Sense, Data Security, Database Security, Financial Security, Information Security, Security Failure, Network Security

via VentureBeat's Evan Schuman, comes the sorry tale of enterprise security failures, and importantly, the continued failures of both security implementation and deployment in the recently high profile retail security snafus of last year [eg. Target's gargantuan credit and debit card breach]  Astonishing...

January 06, 2015 /Marc Handelman
All is Information, Common Sense, Data Security, Database Security, Financial Security, Information Security, Security Failure, Network Security
TS.png

Exactly →

December 02, 2014 by Marc Handelman in All is Information, Data Security, Database Security, Information Security, Infosec Policy, Security Governance, Data Classification

In a tour de force screed, published at InfosecIsland, Steve Martino, details exactly what is required for data classification to succeed, and the impact of that classification effort on an organization's information security posture. (Mr. Martino is CISCO Systems, Inc. (NasdaqGS: CSCO)  CISO and VP of Information Security.)

December 02, 2014 /Marc Handelman
All is Information, Data Security, Database Security, Information Security, Infosec Policy, Security Governance, Data Classification

Concept, Proof of

October 27, 2014 by Marc Handelman in All is Information, Database Security, Data Security, Information Security, Malware

Bad news for Network Attached Storage users, as a newly devised POC now exists. Should you be concerned? Probably.

October 27, 2014 /Marc Handelman
All is Information, Database Security, Data Security, Information Security, Malware

Fleishman's Cloud →

October 21, 2014 by Marc Handelman in All is Information, Data Security, Database Security, Information Security

Glenn Fleishman, writing at MacWorld, regales us with a sort of iCloud Omnibus; in which, the Good Mr. Fleishman tells of Cupertino's take on the security of the remote storage behemoth's infrastructure (also known as Apple Inc.'s (NasdaqGS: AAPL) iCloud).

October 21, 2014 /Marc Handelman
All is Information, Data Security, Database Security, Information Security

Infographica, The Timeline

September 12, 2014 by Marc Handelman in All is Information, Financial Security, Education, Cruft, Information Security, Infographica, Database Security
image.jpg


via the erudite Rapid7 blog

September 12, 2014 /Marc Handelman
All is Information, Financial Security, Education, Cruft, Information Security, Infographica, Database Security

Skimmers, Detailed

August 06, 2014 by Marc Handelman in All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Sciences, Information Security, Infosec Policy, Network Security, Physical Security

HTG explains the inner workings of nefarious card skimmers, installed to abscond with your personal login data and card number, all at your favorite local ATM... Read More

 

August 06, 2014 /Marc Handelman
All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Sciences, Information Security, Infosec Policy, Network Security, Physical Security

BitCoin Security, Kaput

June 23, 2014 by Marc Handelman in Application Security, Cryptography, Data Security, Database Security, Government, Information Security, Mathematics

Fascinating screed, via ArsTechnica, by the inimitable Dan Goodin. In which, the well-lettered Mr. Goodin details the discovery of the paucity of BitCoin security. Surprised? Read more at Ars.

June 23, 2014 /Marc Handelman
Application Security, Cryptography, Data Security, Database Security, Government, Information Security, Mathematics

Database, The Landscape

June 20, 2014 by Marc Handelman in Application Security, Database Security, Data Security, Information Security
June 20, 2014 /Marc Handelman
Application Security, Database Security, Data Security, Information Security
  • Newer
  • Older