14 Aug 2014

Media Guide to Information Security FUD & Fiction

PR is a form of social engineering. Information security companies are often in a highly competitive game to gain attention from the media and increase their brand recognition and visibility. However, this can often lead to tactics to generate FUD (fear, uncertainty and doubt), which yields a bit of hysteria

0
14 Aug 2014

Map of Breached P.F. Changs Locations

P.F. Changs announced last week the list of  33 stores known to have been compromised in their recent breach. The information was compromised between October 13, 2013 and June 11, 2014 and included credit card numbers, names and expiration date. The breach investigation is still ongoing, so additional locations may

0
27 Jun 2014

Book Review – Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

The recent number of high profile retail data breaches has many businesses and security practitioners concerned and for good reason. Retail giants such as Target and Neiman Marcus have suffered from mega breaches, leaving tens of millions of credit cards compromised and leading many to ask how it is possible

0
22 Jun 2014

Cell Phone Jammer As Tool for Home Invasion

I hear a lot about people “cutting the cord” stating they are free from their wired line and more disturbing is the fact they brag about this online via social media to the public. This puts people at significant risk, risk that many are not aware of. Potential thieves or

0