- The data breach and subsequent loss of records for transactions and confidential details of customers are always a matter of concern for any company. However it becomes very difficult to put exact or near exact cost per record loss due to the breach.
- Verizone has tried to breach this barrier and to put cost per record and it comes out to be..... Dollars 0.58 . Amazingly low. Another research firm puts this between 188 to 210 dollars per record.
- Check out the details https://m.facebook.com/l.php?u=https%3A%2F%2Ffortune.com%2F2015%2F04%2F24%2Fdata-breach-cost-estimate-dispute&h=jAQHhn8X8
Awareness and Knowledge means security.
Saturday, April 25, 2015
Cost of data loss: How realistic we are about finances of data breaches?
Monday, April 6, 2015
Facebook Thugging... new era of cyber threats
Ever heard of a term Cyber Bullying. Normally its associated with children being threatened by criminals, paedophiles etc online in chat rooms etc.
However a case of intimidating a facebook user by displaying a gun pointed towards camera with menacing smile has lead to arrest of a lady for "Facebook Thugging".
As per the details available, the lady posted a pic of herself pointing gun towards the camera that was followed by a comment something to the effect that "That's what you will get if you come lookin for me".
Though she took off the pic later on admitting that she thought it was intimidating, police arrested her on the charges of threatening on facebook.
Therefore be careful what you post and how I is going to be visualised by others.
Don't be impulsive. Think before you act.
http://www.techworm.net/2015/04/woman-arrested-for-facebook-thugging.html
However a case of intimidating a facebook user by displaying a gun pointed towards camera with menacing smile has lead to arrest of a lady for "Facebook Thugging".
As per the details available, the lady posted a pic of herself pointing gun towards the camera that was followed by a comment something to the effect that "That's what you will get if you come lookin for me".
Though she took off the pic later on admitting that she thought it was intimidating, police arrested her on the charges of threatening on facebook.
Therefore be careful what you post and how I is going to be visualised by others.
Don't be impulsive. Think before you act.
http://www.techworm.net/2015/04/woman-arrested-for-facebook-thugging.html
Saturday, February 28, 2015
Digital Forensics Application Software EnCase
The Digital forensics or more precise computer forensics fascinated me a lot ever since I ssaw a demo on stenography. Later on while handling the same and using various forensic software suites further made me interested in exploring the various facets of Digital forensics.
However once i started pursuing my MS, it left little time to do something else.
Recent chance meeting, though long overdue, with a good friend who had switched his job made me think again about rekindling this area once again.
Today when I thought of starting once again, first thing about digital forensics struck me was , to know more about EnCase.
Came across this primer and advanced link. I thought of sharing with you all.
Digital Forensics Today Blog: A Treasure Trove of EnCase Version 7 Resources to Help You Make the Transition
However once i started pursuing my MS, it left little time to do something else.
Recent chance meeting, though long overdue, with a good friend who had switched his job made me think again about rekindling this area once again.
Today when I thought of starting once again, first thing about digital forensics struck me was , to know more about EnCase.
Came across this primer and advanced link. I thought of sharing with you all.
Digital Forensics Today Blog: A Treasure Trove of EnCase Version 7 Resources to Help You Make the Transition
Friday, February 20, 2015
Lenovo Compromises Laptops Security.
China has done it again.
One of world's three largest Laptop and PC manufacturer faltered as it inadvertently installed an adware Superfish.
This adware or the software that automatically displays advertisements, maliciously hijacks the encrypted connection and throws open them for hackers to launch MITM(man in the middle) attacks and also eavesdrop on your communications via infected laptop.
This was reported by CEO of security research firm Errata Securities.
As per the report even uninstalling Superfish doesn't mitigate the threat. The Software has already authorised itself to take over secure connections and throws them open, declaring them safe and trusted, even when they are not. This leaves the laptop vulnerable to NSA type snooping attacks.
In recent past similar reports of Xiomi collecting user data and sending them to servers In China.
More details can be explored.on the link given below.
Happy Hunting.
http://goo.gl/9SHXJl
One of world's three largest Laptop and PC manufacturer faltered as it inadvertently installed an adware Superfish.
This adware or the software that automatically displays advertisements, maliciously hijacks the encrypted connection and throws open them for hackers to launch MITM(man in the middle) attacks and also eavesdrop on your communications via infected laptop.
This was reported by CEO of security research firm Errata Securities.
As per the report even uninstalling Superfish doesn't mitigate the threat. The Software has already authorised itself to take over secure connections and throws them open, declaring them safe and trusted, even when they are not. This leaves the laptop vulnerable to NSA type snooping attacks.
In recent past similar reports of Xiomi collecting user data and sending them to servers In China.
More details can be explored.on the link given below.
Happy Hunting.
http://goo.gl/9SHXJl
Thursday, February 19, 2015
TV is Watching Your Actions
Till now everyone was watching their favourite movies, soap operas and adventure, sports program on big LED TVs . Now , however the TV are becoming smart and they are “keeping an Eye” on your activities.Read the article for complete details
Beware! Samsung Smart TV Is Listening To Everything You Say!
Sunday, February 15, 2015
Hexinator....a good hex editing software
Every time you have a situation where in you require to go through the binaries and raw files, go through hex data to determine what's happening behind the scene or attempt reverserngineering , you look for a good hex editor and at times any additionalinformation provided by the hex editor is welcome.
Thus get hold of New Hexeditor.
Details at https://hexinator.com/
Thus get hold of New Hexeditor.
Details at https://hexinator.com/
Sunday, January 11, 2015
CyanogenMod: A New Version of Android
What is CyanogenMod?
- Its another Operating System from the Stables of OPEN SOURCE communities
- Its a based on Android Platform.
- It supports
- native theming support,
- FLAC audio codec support,
- a large Access Point Name list,
- an OpenVPN client,
- Privacy Guard – a per-application permission management app,
- support for tethering over common interfaces,
- CPU overclocking and other performance enhancements,
- soft buttons and other "tablet tweaks",
- Wi-Fi, Bluetooth and GPS, etc.
- It also boasts of increased performance and reliability compared with official firmware releases.
- Its development cycle grew with new releases of Android right from Gingerbread, honeycomb, Ice Cream Sandwitch, jelly bean and now Kitkat.
- No longer releasing Stale modes of OS. only rolling models .
- The first nightly release of CyanogenMod 12, based on Android 5.0 Lollipop, began rolling out for a selected number of devices on 6 January 2015.
ATM Vulnerabilties Enable Cash Withdrawal Without Debit
- One would have come across the reports in news papers, how the ATM was targeted and cash looted by robbers or hoe they skimmed off your account off some cash when you didn't bother about the guy standing behind you inside the ATM observing you entering the PIN (Shoulder Surfing).
- There were instances of a key logging device pasted over the Keypad that would transmit all ATM PINs entered to the hacker.
- Can you beat this " Withdraw the Cash Legitimately without getting it debited FROM OUR ACCOUNT"
- Yes.
- The modus Operandi is very simple. After You have entered the PIN and amount required to be withdrawn, you just block the cash dispensing opening. The machine will take it as fault in delivery mechanism and reverse the debited amount. However your cash would have been dispensed by then.
- This kind of fraud has been reported in Bangalore by a security firm against bank employees, though no arrest has been made in tis connection so far.
Subscribe to:
Posts (Atom)
