SecurIT360 Blog

In-depth IT and cybersecurity news and education

Information Security>Data Breach|Computer & Network Security>Malware|Compliance>PCI|Research

Target Data Breach Timeline

Updated: Originally posted by the WSJ, and sourced here from Business Insider, Target had warning last spring about a new emerging threat against POS systems.

Information Security>Data Breach|Compliance>Privacy

Target Breach now affects 110 million users

Joshua Carter, public relations manager at Target, said, “This theft is not a new breach; these are two distinct thefts as part of the same

Computer & Network Security|Information Security|Social Engineering>Phishing|Compliance>Privacy

LinkedIn Profiles: Ripe for phishing recon

The author notes that LinkedIn has “…more than 259 million members—many who are highly paid professionals in technology, finance, and medical industries—LinkedIn holds a wealth

Research|Computer & Network Security>Vulnerabilities

OWASP Top 10 For Developers

Troy Hunt wrote a great series on the OWASP top 10 for developers.  This series is a few  years old, but still completely relevant since

Computer & Network Security>Malware|Computer & Network Security>Viruses

Hackers announce ramsomware toolkit

Two hackers, going by ‘gyx’ and ‘Porphyry’, have released what they are calling Prison Locker, a toolkit for customizing your own ramsomware.  They are apparently selling

Information Security|Computer & Network Security>Malware

Who was affected by the php.net attack?

This is related to our initial post about the PHP.net attack and whether or not the source code was compromised.  According to this article, “One

Information Security|Compliance>Privacy|Social Engineering|Computer & Network Security>Vulnerabilities

Are the websites you’re using tracking what you type?

Source – http://nakedsecurity.sophos.com/2013/12/17/are-the-websites-youre-using-tracking-what-you-type/ Backspacing, the select all/delete, hitting cancel or whatever it takes to avoid telling the world whatever it was that you typed may have

Compliance|Information Security>Data Breach|Computer & Network Security>Patches|Computer & Network Security>Vulnerabilities

Poor Patching, Communication Facilitated July Dept. of Energy Breach

Source: http://threatpost.com/poor-patching-communication-facilitated-july-dept-of-energy-breach/103200 The U.S. Department of Energy is describes what lead to July breach Failures around vulnerability management, access controls and a general lack of communication