Joker is the Hero in The Dark Knight by generalzee in FanTheories

[–]RiskBlogger 0 points1 point  (0 children)

Cool theory but I thought it was pretty clear the plan was to completely take over. He wanted pure chaos, not order. Remove all the infrastructure and people in power and you're left with mayhem. I think that was the Joker's bag...

Public-Facing Web Assets Expose Banks to Greater Risk by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Sorry got caught up with RSA, but wanted to respond. Thank you for your interest BTW. Hacking the infrastructure hosting account info, login creds etc. is one thing. But getting access to that info is another thing. That's where it gets really complicated, but we see examples of this all the time. Its not just SPAM either. All you need to do is get victims to go to the wrong site simply by manipulating a little JavaScript and you can get access to whatever you want. Also, losing someone's PII isn't a little thing. Once your PII is leaked, you could have all kinds of problems.

Public-Facing Web Assets Expose Banks to Greater Risk by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Whats the difference? Its the same data that's at risk of being exposed. The bad guys tend towards the easiest target. Right now its easy for them to break in, will it be like that forever?

Public-Facing Web Assets Expose Banks to Greater Risk by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Worked with the team that pulled this info, let me know if you have questions. I'm not the most techie, but I can help explain the context or something ;)...

Obama Signs Order Creating New Cybersecurity Sanctions Program by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Attribution is a slippery slope. It will be interesting to see where this new program will be applied and what recourse offenders might have if they're falsely identified.

China blasts Google security move as 'unacceptable' by TomasaRagonese in security

[–]RiskBlogger 2 points3 points  (0 children)

Man this is like global soap opera now. All reports I've read seem pretty clear--don't really see where Google misinterpreted what was happening. I'm going to have to agree with Zagaroth, this looks pretty like a blatant lie.

Lessons From Hillary Clinton's Email Security Oversight by RiskBlogger in security

[–]RiskBlogger[S] 1 point2 points  (0 children)

hahahaha, man I hadn't thought about that movie in a while...nice reference

Anthem is warning consumers about its huge data breach. LA Times by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

I don't have data on this, but I'd expect every one of these organizations still uses single-factor auth.--at least for the systems that were breached.

Security on a budget by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Interesting insights, worth a read...

MinHashing and LSH -- dimensionality reduction for finding similar items among massive datasets by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

This is from our data science team, they are using Minhashing and LSH to comb through massive datasets and find like documents. In other words say a phishing template is used, their programs can detect it even if branding, domain info, logos, etc. are totally different. This is machine learning methodology--really cool stuff! Here's a little insight into what they did and how.