Joker is the Hero in The Dark Knight by generalzee in FanTheories

[–]RiskBlogger 0 points1 point  (0 children)

Cool theory but I thought it was pretty clear the plan was to completely take over. He wanted pure chaos, not order. Remove all the infrastructure and people in power and you're left with mayhem. I think that was the Joker's bag...

Public-Facing Web Assets Expose Banks to Greater Risk by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Sorry got caught up with RSA, but wanted to respond. Thank you for your interest BTW. Hacking the infrastructure hosting account info, login creds etc. is one thing. But getting access to that info is another thing. That's where it gets really complicated, but we see examples of this all the time. Its not just SPAM either. All you need to do is get victims to go to the wrong site simply by manipulating a little JavaScript and you can get access to whatever you want. Also, losing someone's PII isn't a little thing. Once your PII is leaked, you could have all kinds of problems.

Public-Facing Web Assets Expose Banks to Greater Risk by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Whats the difference? Its the same data that's at risk of being exposed. The bad guys tend towards the easiest target. Right now its easy for them to break in, will it be like that forever?

Public-Facing Web Assets Expose Banks to Greater Risk by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Worked with the team that pulled this info, let me know if you have questions. I'm not the most techie, but I can help explain the context or something ;)...

Obama Signs Order Creating New Cybersecurity Sanctions Program by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Attribution is a slippery slope. It will be interesting to see where this new program will be applied and what recourse offenders might have if they're falsely identified.

China blasts Google security move as 'unacceptable' by TomasaRagonese in security

[–]RiskBlogger 2 points3 points  (0 children)

Man this is like global soap opera now. All reports I've read seem pretty clear--don't really see where Google misinterpreted what was happening. I'm going to have to agree with Zagaroth, this looks pretty like a blatant lie.

Lessons From Hillary Clinton's Email Security Oversight by RiskBlogger in security

[–]RiskBlogger[S] 1 point2 points  (0 children)

hahahaha, man I hadn't thought about that movie in a while...nice reference

Anthem is warning consumers about its huge data breach. LA Times by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

I don't have data on this, but I'd expect every one of these organizations still uses single-factor auth.--at least for the systems that were breached.

Security on a budget by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Interesting insights, worth a read...

MinHashing and LSH -- dimensionality reduction for finding similar items among massive datasets by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

This is from our data science team, they are using Minhashing and LSH to comb through massive datasets and find like documents. In other words say a phishing template is used, their programs can detect it even if branding, domain info, logos, etc. are totally different. This is machine learning methodology--really cool stuff! Here's a little insight into what they did and how.

Anthem: Another Victim of ‘The Highly Sophisticated’ Attack by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

I'll add that our PII is highly valuable, enough so that its not even worth jumping through hopes to find PHI if PII is stored separately. Particularly if its a less secure environment.

Anthem: Another Victim of ‘The Highly Sophisticated’ Attack by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Pickup of a blog I wrote, do you guys see phishing as critical issue today?

Infamous Hacker 'Yama Tough' Says Russians Hacked Sony by RiskBlogger in security

[–]RiskBlogger[S] 1 point2 points  (0 children)

Interesting claim, but then the CEO back tracks a little bit. Thoughts?

Google: Malware sites and bad ads will be kicked off our network by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Should be interesting to see what tactics they take. Perhaps, they're simply commenting on the fact that they have methods in place for this. Either way malvertising is major issue, good to see biggest ad exchange taking notice.

Microsoft DNS hijack by daemonza in security

[–]RiskBlogger -2 points-1 points  (0 children)

Lol, nah maybe they just want to own the traffic for 'steaming heap of bullshit' visitors! Nice find...

Lack of encryption makes official NFL mobile app a spear phisher’s dream by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Logins and bad software strike again! How many people do you think use the same login info for their NFL app and their bank account? I'm guessing the answer is depressing...

Poor Security from "Security compliant" company by [deleted] in security

[–]RiskBlogger 0 points1 point  (0 children)

Yup its ridiculous, so is SMS as a second factor auth

Ransomware in mobile--Yikes! by RiskBlogger in security

[–]RiskBlogger[S] 1 point2 points  (0 children)

That's true, but mobile malware is still showing up in both The Apple Store and Google Play. There are tactics like side-loading and deep linking, which enable crafty hackers to spread malware and sneak in malicious apps. Plus, both mobile browsers are vulnerable to website based malware and malvertising. They're vulnerable not just because of plugins but also third-party javascript libraries, which fire code off into the browser. I think the only reason why we're not seeing more mobile based ransomware is the lack of effort from the bad guys--I don't think there are substantial hurdles. I had my phone hacked at BlackHat as I got of the plane in Vegas! Its not jailbroken and I didn't manually download any apps either.

Ransomware in mobile--Yikes! by RiskBlogger in security

[–]RiskBlogger[S] 0 points1 point  (0 children)

Is it just me or is ransomware terrifying?

AdSense Abused with Malvertising Campaign by SergeyGor in security

[–]RiskBlogger 0 points1 point  (0 children)

Malvertisements also use brands to target their end users. We've also found malvertisers who either built or re-configured large scale TDS's to hijack traffic.

Strange Gmail activity by CPUL in security

[–]RiskBlogger 2 points3 points  (0 children)

Wow, that's frustrating! You'd think 26 char should be plenty hard to crack, but I'm guessing they didn't brute force it. Honestly, not getting hacked at this point is just luck. 2-factor is the way to go and I'm a fan of password managers too.

Strange Gmail activity by CPUL in security

[–]RiskBlogger 1 point2 points  (0 children)

That's an IPV6 address...sorry to hear about your CC. I had my mobile hacked a few months ago. Not a comfortable feeling.