Posts filed under: Blog

My credit card and the Washington Secretary of State site used in credit card fraud

It was 0730 in the morning and my wife, Kathy, calls down from her office and asks what the $200 charge was on her credit card to the Washington Secretary of State. She had seen the charge come through on... Read More

Murder in Pyongyang

The world collectively learned of the passing of Otto Warmbier, the U.S. student who was held in North Korea. Let me correct this, Otto Warmbier who was murdered by the Kim Jung Un regime. Warmbier had the audacity to lift a... Read More

Dmitry Dokuchaev – Playing Both Sides?

Dmitry Dokuchaev, Major in the Russian Federal Security Service of the Russian Federation (FSB; Russian: Федеральная служба безопасности Российской Федерации (ФСБ)), was arrested by the Russian FSB and charged with treason in December 2016 (see: Russian FSB cybersecurity implosion continues with more... Read More

Social Engineering: From Qatar With Love – Cyber espionage

Is the Government of Qatar perfecting their social engineering or is this a case of Qatar vigilantism? A recent write-up by Claudio Guarnieri, a security researcher working for Amnesty International, leans toward nation state sponsorship, exercising what he describes as “Operation... Read More

Departing Zynga Employees Heist Intellectual Property?

Easiest way to lose your intellectual property?  When your departing employee walks your intellectual property right out the door. It happens far too often and the insider threat you thought of as a hypothetical?  Well, it is now a reality.... Read More

Russian FSB cybersecurity implosion continues with more arrests

As we discussed in our recent piece, “Russia’s FSB Cybersecurity Team Implodes” the number of individuals who are in shackles from within the FSB cybersecurity entities continues to increase, and the timeline of the Russian security service, Federal Security Service... Read More

January 28, 2017 – International Data Privacy Day

I am pleased to be recognized as a Data Privacy Day Champion, as is Prevendra. Every day efforts are expended to assist companies and individuals protect their collective privacy. In 2016 we witnessed millions of individuals having had their private information... Read More

Russia’s FSB Cybersecurity Team Implodes

While the world was watching the United State’s election and the debate over whether or not the Russian’s hacked the DNC and influenced the election, the Russian Federation was engaged in some of their own housecleaning. A followup report to... Read More

Customer Loyalty Sweepstakes: The winner engages the customer securely

The 2016 Nielsen report addressing customer loyalty,  “Allegiant Alignment: What Faithful Followers of Retail Loyalty Programs Want” based on the 2016 Nielsen Global Survey of Loyalty Sentiment polled more than 30,000 online consumers in 63 countries throughout Asia-Pacific, Europe, Latin... Read More

Financial Advisor at Ameriprise exposes millions in assets via NAS

Do you use a financial advisor? I do, and I recommend mine to others without reservation. Part of that recommendation comes from the manner in which the account data is secured, which provides me more than a modicum of assurance... Read More

BYOD: Users are a nightmare without policies

Over the course of the past several years business leaders have evaluated and implemented the bring-your-own-device (BYOD) movement as a cost-effective methodology to preserve or reduce information technology (IT) operating expenses. In the quest to reduce these operational expenses, one... Read More

Ransomware: Attack and Resolution

Companies continue to fall victim to ransomware* on a regular basis. According to an IBM X-Force® Research report, “Ransomware: How consumers and businesses value their data” 70 percent of companies who have fallen victim to ransomware, have paid the ransom. The FBI... Read More

Ethics in sports? Insider threat in ACC football evidenced

Nothing is sacred, as the hosts of ESPN’s Pardon the Interruption Tony Kornheiser and Michael Wilbon, discuss. Trade secrets and intellectual property (the playbook contents) in collegiate football have value, and apparently some schools within the Atlantic Coast Conference (ACC) were... Read More

Madison Square Garden customer payment cards harvested

On 22 November, Madison Square Garden Company (The Garden) began notifying their customers that a breach of the point of sale (POS) system had occurred, and may have affected those customers who purchased goods at merchandise and food concessions at The... Read More

MSU data breach: Database with 400,000 records accessed

Michigan State University (MSU) has confirmed that on Nov. 13 an unauthorized party gained access to an MSU server containing certain sensitive data which included the personal identifying information of 400,000 individuals. The MSU data breach, characterized by the MSU... Read More

JPMorgan runs afoul of the FCPA: $264 million settlement

This past week we learned that the Foreign Corrupt Practices Act (FCPA) has teeth. JP Morgan Chase (JPMorgan) essentially, used the hiring of the children of Chinese leaders as a bribe in exchange for US$100,000,000 in deals in China a... Read More

Data Breaches again at Horizon Blue Cross Blue Shield New Jersey (Horizon BCBSNJ)

It seems health insurer Horizon Blue Cross Blue Shield New Jersey (Horizon BCBSNJ) can’t catch a break. During the course of 2015 (1100) and 2016 (170,000), they have had two more incidents which compromised or placed at risk the protected... Read More

Kremlin’s Clinton Gambit Fails With Trump’s Election

A little over a month ago I wrote of the Russian gambit to influence the US national elections by seemingly backing the Republican party candidate Donald J. Trump in hopes that the US electorate would swing in mass to back... Read More

Insider Threat – Canadian privacy breached as PHI/PII goes missing in Manitoba

Patients in Manitoba are receiving notification from their healthcare providers, that their personal and sensitive information has been lost or inappropriately accessed. As all who have responsibility for the security of information, the insider threat is very real. Often times... Read More

Chinese Cyber Espionage: What’s leaving your smartphone?

This week we saw, possible evidence of, yet another form of the Chinese cyber espionage. Smartphones calling “home” to China with user data. This is every government’s worst counterintelligence and cyber security nightmare. We are warned, repeatedly about the threat... Read More