The 10 Most Significant Hacks of 2015

The key word here is ‘significant’. It would be easy to classify hacks according to how many people were compromised, but that is only one factor in determining if a hack is significant or not. Other factors must include the value of the information stolen or compromised, the uniqueness of the mode of attack, and … Continue reading The 10 Most Significant Hacks of 2015

Just in Time for the Holidays; History’s Worst Credit Card Hack

If you ever attend a black hat hacker convention, you will be warned not to carry credit cards. You are advised to keep all credit cards in your hotel room or, if you must carry them, to bunch them together or put them in a special holder. But wait a minute. Aren’t retailers supposed to be … Continue reading Just in Time for the Holidays; History’s Worst Credit Card Hack

Dangerous New Attack Vectors Unveiled at Black Hat Europe 2015

For most companies and institutions, security is a game of catch-up. You may have the most up-to-date security software available to protect yourself from all known threats, but it’s the threat a few years down the line that will likely be your undoing. You can’t prepare yourself against an attack vector that currently doesn’t exist. … Continue reading Dangerous New Attack Vectors Unveiled at Black Hat Europe 2015

How Terrorists Communicate

One of the first questions many security experts had about the Paris terrorist attacks was: How is it possible that such a well-planned and coordinated attack could fly under the intelligence radar? The answer to this question was quite surprising. It was, according to some in the intelligence community, that they had too much intelligence. … Continue reading How Terrorists Communicate