iCloud Burst: Preparing for El Nino of Exploits

Wired Magazine first broke the news last week of a hole in two-step verification system in Apple’s iCloud service that allowed hackers to obtain private celebrity photos.  In a broader perspective, this demonstrated iCloud and other cloud storage services could...

Password Management and Physical Authentication

There is no longer any validity to the belief that you can “set-and-forget” anything, especially usernames and passwords.  When the New York Times broke the story of a Russian crime syndicate that collected 1.2 billion username and password combination by...

FBI and Secret Service Investigating Bank Cyberattacks

It was only earlier this week news surfaced that JPMorgan customers were being targeted in a broad e-mail phishing campaign. The campaign attempted (to an unknown degree of success) to collect credentials for that bank and also infect PCs with a virus for stealing...

Free WiFi – A Potentially Dangerous Amenity

If you’re like most people, you don’t think twice when you go into a public place like Starbucks with your laptop and jump on to the free wireless connection to do a little work.  Free WiFi is a godsend when you’re waiting for your flight at the...

Unwelcome Package – Backoff Malware Delivered to UPS

United Parcel Service has released a breach notification to customers who used payment cards during the last seven months at UPS stores that their personal information may have been stolen.  An internal audit inspired by the DHS “Backoff” malware warning...