When Undercover Credit Card Buys Go BadBrian Krebs, Krebs on SecurityLaw enforcement officials and bank anti-fraud specialists sometimes purchase stolen cards from crime forums and “carding” markets online in hopes of identifying a pattern among all the cards from a given batch that might make it easy to learn who got breached: If all of the cards from a given batch were later found to be used at the same e-commerce or brick-and-mortar merchant over the same time period, investigators can often determine the source of the card breach, alert the breached company and stem the flow of stolen cards. Rabu, 03 Feb 2016
The Role of Phony Returns in Gift Card FraudBrian Krebs, KrebsonSecurityOn any given day, there are thousands of gift cards from top retailers for sale online that can be had for a fraction of their face value. .....Rabu, 03 Feb 2016
Russia's cyber-attack losses may reach US$1 bnEugene Gerden, SC MagazineRussian businesses are forecast to lose almost US$ 1 bn (70 billion rubles £662 million) from cyber-attacks this year and this figure is expected to continue to grow in the near future, Lev Khasis, first deputy chairman of Sberbank, Russia's largest state-owned bank, and a former vice-president of Wal-Mart, told SCMagazineUK.com.Rabu, 03 Feb 2016
French police consider restricting public Wi-Fi and Tor services during times of crisisJason Murdock, V3French law enforcement is reportedly weighing up proposals to restrict the use of public Wi-Fi and access to the Tor network during times of crisis, according to leaked documents from the French Ministry of Interior published by website Le Monde.Selasa, 02 Feb 2016
EU lawmakers, countries agree on bloc's first cyber-security lawJulia Fioretti, ReutersEU lawmakers and member states struck a deal on the bloc's first cyber-security law on Monday that will require Internet firms such as Google and Amazon to report serious breaches or face sanctions.Selasa, 02 Feb 2016
SMBs in US, UK, Australia Lack Resources; Consider Outsourcing IT SecurityRazvan Muresan, HOTforSecuritySome 81% of decision makers in small and medium-sized businesses from the US, the UK, and Australia surveyed by Wakefield Research consider that outsourcing cybersecurity would enhance their ability to focus on core business processes, while only 37% say they are completely ready to manage IT security and protect against threats. ....Selasa, 02 Feb 2016
What Does a Cyber Security Strategy Look Like? Team Cymru BlogOne of the ways I keep up with what is new and current thinking in the cyber security world when I am on the road is by listening to the “Through the Security Rabbit Hole” podcast. ...Selasa, 02 Feb 2016
Industry Threat Focus: RetailTeam Cymru BlogWith Black Friday and Cyber Monday safely in the bag, retailers are probably looking forward to a few more weeks of brisk trade in the run up to Christmas. Then just over the horizon, mince pie fueled Boxing Day and January sales – for all the things Santa just couldn’t quite fit in his sleigh. ....Selasa, 02 Feb 2016
Millions of Internet Things are “secured” by the same “private” keysPaul Ducklin, Naked Security (Sophos Blog)European security consultancy SEC Consult has spent time over the past few years looking at embedded devices on the internet. ...Selasa, 02 Feb 2016
Wish list app from Target springs a major personal data leakDan Goodin, arstechnica "According to researchers from security firm Avast, the database storing the names, e-mail addresses, home addresses, phone numbers, and wish lists of Target customers is available to anyone who figures out the app's publicly available programming interface. In a blog post published Tuesday, ...Selasa, 02 Feb 2016
Disclaimer | Copyright © 2013 - Id-SIRTII/CC
Id-SIRTII/CC - Indonesia Security Incident Response Team on Internet Infrastructure/Coordination Center
Menara Ravindo Lt. 17, Jl. Kebon Sirih No. 75 Jakarta Pusat, 10340, Indonesia
Member of: