Why does “everybody” think they are being/were hacked by Russian hackers?

Short answer: See the column “Country”. When I say “Russia”, I mean all Russian speaking countries, from the ex sovietic block. “Everybody” in quotes means the vast majority.   Long answer: Some time ago, I was writing that China is massively attacking my blogs. Now, it seems that the situation has changed a lot. But, what is the reason why this changed? Can it be that the Russian hackers are becoming more aggressive ?  Can be that they are “hungrier”. Or are these attacks sponsored by some entity? It might be, but then why my sites ? 🙂 Or did…


Healthcare mobile device security 101—solving modernization risk factors

Source: “Healthcare mobile device security 101—solving modernization risk factors” by Michael O’Dwyer | December 22, 2016 Many of these devices aren’t designed for business use, which is another cause for concern. According to Sorin Mustaca, CSSLP, Security+, Project+, owner of Sorin Mustaca IT Security Consulting, “Most of these devices are taken from the consumer world and quickly adapted to use in healthcare. For this reason, these devices are not always properly secured, making the threat landscape pretty much unknown.” Mustaca agreed, adding that recognizing the dangers is paramount and includes dealing with risks, such as lost or stolen devices, and…


Stock spam is back!

After many years, the penny stock spam is back. Hello, info! <name> needs your attention. This is the only stock you need to buy today. Keep on reading to find out why.. <name>(ticker: <tick>) is a mobile games developer that has built some of the most popular games on the planet. The games have been downloaded more than 100 million times and the company is planning to launch 5 new titles in January 2017 (next month). <tick> is extremely undervalued and there are serious rumors circulating that the maker of Candy Crush (King, a multi billion dollar company) is about…


Why most, if not all, “New Generation” endpoint security product are not self-sustained?

Fire Eye, Sentinel One, Crowdstrike, HackerOne, Cylance, Cyphort, Trustlook, Venafi, Clavister, Invincea,  Code42,  just to name a few,  are so called NG Cybersecurity startups. NG comes from “New Generation” or “Next Generation”… (Yeah, just like in StarTrek. 🙂 )   What exactly are these “NG” products and services? There is no single definition that fits them all. Here are the common features: All of them have a cloud backend. Some install an agent on each machine, some install an appliance that acts as a sniffer in the network. Some others must be installed on the default gateway where they take…



Love statistics? Read here what went wrong with the USA presidential election polls

Source: http://stats.stackexchange.com/questions/245063/us-election-results-2016-what-went-wrong-with-prediction-models   Original question: First it was Brexit, now the US election. Many model predictions were off by a wide margin, and are there lessons to be learned here? As late as 4 pm PST yesterday (n.b. on 08.11), the betting markets were still favoring Hillary 4 to 1. I take it that the betting markets, with real money on the line, should act as an ensemble of all the available prediction models out there. So it’s not far-fetched to say these models didn’t do a very good job. I saw one explanation was voters were unwilling to identify…


Scary to see details of the World’s Biggest Data Breaches

Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/   No worries, the chart is very interactive and you can select what you want to see by changing the filter: The problem is that if you select like the screenshot below, you will not see anything anymore. This is scary!   Statistics? Actually, the data is scary: it seems that at any point in time there was a breach.     Here is the source of the data: https://docs.google.com/spreadsheet/ccc?key=0AmenB57kGPGKdHh6eGpTR2lPQl9NZmo3RlVzQ1N2Ymc&single=true&gid=2&range=A1%3AW400    


Vulnerability analysis: how “HTTPoxy” allows redirect of web applications http-queries

This is a guest post written by Alex Bod, Information Security Researcher and the founder of the Gods Hackers Team.   The information about a set of vulnerabilities called HTTPoxy was published on July 18. Using this, attackers can replace the HTTP_PROXY environment variable that allows them to redirect http-queries to the Web applications on their resources. The vulnerability was identified in partnership with the developer Dominic Scheirlinck, who in his blog talked about how the vulnerability was discovered by his colleagues in the analysis of one of the tickets, received in support.   How it works   Scheirlinck explains in…


DOS challenges with ITsecurity.co.uk

We were faced on ITSecurity.co.uk with a problem which was at first out of our control: “somebody” is creating, probably without knowing, a denial of service on this website. The consequence was that it was “consuming” the accesses to the database behind this WordPress site. The ISP hosting the website limits the accesses to 50K a day. More accesses require a high plan, three times more expensive. The “somebody” is an IP from Canada which, considering the fact that it is retrying every second, it is most probably a script out of control. First thing, I contacted the owner of the IP address at…



By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close