Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Trust, Lack Thereof... →

December 29, 2014 by Marc Handelman in All is Information, Blatant Stupidity, Crime, Malware, Network Security, Racketeering, Sarcasm, Security Governance, Web Security, Security Failure

Information is Beautiful has created a diagrammatical tour de force, carving the litany of questionable security competence within the compromised companies, onto like-minded  information security architects, engineers and researchers.

Read it and weep my friends...

December 29, 2014 /Marc Handelman
All is Information, Blatant Stupidity, Crime, Malware, Network Security, Racketeering, Sarcasm, Security Governance, Web Security, Security Failure

Feet of Clay

August 22, 2014 by Marc Handelman in All is Information, Governmental Corruption, Government, Governance, Information Security, Racketeering, Identity Theft

Municipalities just as private corporations, engage in seemingly mad, long dashes for revenue; to what end? In this case, speeding and red light traffic infraction generated income is the goal, whilst minimizing law enforcement hands on in the process. Unfortunately, the corporate entity that facilitates that revenue stream with traffic recording devices and cameras apparently possess clear-cut, if you will, evidence of proverbial feet of clay...

 

August 22, 2014 /Marc Handelman
All is Information, Governmental Corruption, Government, Governance, Information Security, Racketeering, Identity Theft

NASDAQ, Purloined

July 21, 2014 by Marc Handelman in All is Information, Crime, Cybernetic Crime, Network Security, Racketeering, Financial Security

via Michael Riley, writing at Bloomberg Businessweek, comes the sordid tale, with film-noir-like building-blocks, of miscreant Russian nationals targeting the NASDAQ stock exchange, the kicker? They succeeded...

July 21, 2014 /Marc Handelman
All is Information, Crime, Cybernetic Crime, Network Security, Racketeering, Financial Security

Insert Here

July 10, 2014 by Marc Handelman in All is Information, Application Security, Cryptography, Data Security, Information Security, Network Security, Racketeering, Physical Security, Financial Security

Via the inimitable Brian Krebs, of Krebs on Security, comes reports of insert, thin and mini card skimmers, and the perils of automated banking and commerce for consumers worldwide. The astonishing component to this litany of miscreant evil-doers is the apparent inability of hardware manufacturers' to detect, notify and terminate these devices at will [or, at the very least, reject all cards on the machine when nefarious activities are suspected].

July 10, 2014 /Marc Handelman
All is Information, Application Security, Cryptography, Data Security, Information Security, Network Security, Racketeering, Physical Security, Financial Security

Watershed Numbers, Tech Extortion Grows

June 25, 2014 by Marc Handelman in All is Information, Extortion, Crime, Racketeering, Cybernetic Crime

Evidence of extortion racketeering bubbles up through the flotsam of crime targeting tech sector entities , worldwide. Bad tidings, yet hardly surprising.

June 25, 2014 /Marc Handelman
All is Information, Extortion, Crime, Racketeering, Cybernetic Crime