Media Guide to Information Security FUD & Fiction
PR is a form of social engineering. Information security companies are often in a highly competitive game to gain attention from the media and increase their brand recognition and visibility. However, this can often lead to tactics to generate FUD (fear, uncertainty and doubt), which yields a bit of hysteria
Map of Breached P.F. Changs Locations
P.F. Changs announced last week the list of 33 stores known to have been compromised in their recent breach. The information was compromised between October 13, 2013 and June 11, 2014 and included credit card numbers, names and expiration date. The breach investigation is still ongoing, so additional locations may
Book Review – Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions
The recent number of high profile retail data breaches has many businesses and security practitioners concerned and for good reason. Retail giants such as Target and Neiman Marcus have suffered from mega breaches, leaving tens of millions of credit cards compromised and leading many to ask how it is possible
Cell Phone Jammer As Tool for Home Invasion
I hear a lot about people “cutting the cord” stating they are free from their wired line and more disturbing is the fact they brag about this online via social media to the public. This puts people at significant risk, risk that many are not aware of. Potential thieves or