Chatting with a Femme Fatale

“Its depressing how stupid people are and how easily they can be tricked into giving over their CC number or persuading them to join a site you get commission from… lonely guys are stupid and easily swindled out of money.” Quote of a female-chatbot programmer Yes, I agree that men can be easily conned by … Continue reading Chatting with a Femme Fatale

Experts Say These Are the Breaches to Expect in 2015

At the beginning of every year, top security firms and professionals make predictions about what type of cyber attacks they expect to encounter in the next 12 months. I have looked at predictions made by 5 of the top experts to see if there are any consistent themes. I compared predictions from Websense (WS), FireEye … Continue reading Experts Say These Are the Breaches to Expect in 2015

Hackers: You Can’t Beat Them, But You Can Sure Make Their Lives Difficult

This is one of the main ideas I came away with after attending the Mandiant/FireEye webinar yesterday. The webinar, “From the Front lines: What really happened at MIRcon” (Mandiant Incidence Response Conference) summarized some of the main talks from that conference. Mandiant was acquired by FireEye in January and, together, they are recognized as one … Continue reading Hackers: You Can’t Beat Them, But You Can Sure Make Their Lives Difficult

Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

There are three main reasons for hacking. One is for financial gain, one is for acquiring protected information, and the third is to achieve some political objective. The second reason for hacking, that of acquiring protected information, is often used, at a later time, to achieve financial gain, but its motivation is somewhat different than … Continue reading Businesses, Government Agencies, and Political Dissenters Beware. Chinese Predators May Be Lurking at the Waterhole: Understanding Waterhole Attacks

New Internet Explorer Vulnerability Can Make Heartbleed Look Like Simple Heartburn

It’s called Operation Clandestine Fox and it has the potential to be very dangerous. The problem is that this vulnerability comes shortly after the Heartbleed episode which may make people shrug it off as just another bug. But this is what Microsoft has to say about it: “an attacker who successfully exploited this vulnerability could … Continue reading New Internet Explorer Vulnerability Can Make Heartbleed Look Like Simple Heartburn