By: - Independent Computer Security Analyst


Supervalu Shoppers At Risk After Hackers Steal Credit Card Details – and other stores affected too

August 18th, 2014

Customers who have used their credit cards at a US supermarket chain between June 22nd and July 17th 2014 are being warned to check their bank balances, after it was discovered that criminals had hacked their way into networks and potentially accessed shoppers’ private data. Supervalu has published a security advisory on its website, warning that […]

By: - Senior Architect


Stealthy Malware is Never Invisible

August 5th, 2014

New malware identified as ‘Poweliks’ is currently in the news because of its stealthy nature.  The malware does not reside as a file on the disk, rather it is stored in the registry and uses some interesting tricks to execute at startup and remain hidden from system administrators.  The full description of the malware can […]

By: - Dir. Solutions Marketing

Infosec Haiku

July 21st, 2014

Anata no joho sekyuritei konshu no haiku Energetic Bear Attacking ICS Space Havex is Havoc   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if yours is published, […]

By: - Dir. Solutions Marketing

Infosec Haiku

July 14th, 2014

Anata no joho sekyuritei konshu no haiku Shylock Taken Out Financial Trojan Demands For Pound of Flesh Cease   ### Notes ### * Thanks to Ms. Etsuko vdH for the translation. * Thanks to everyone who’ve contributed their haikus … watch this space to see if yours is published. * Submit Your Own … if […]

By: - Independent Computer Security Analyst


Security Tips for Football World Cup Fans

June 13th, 2014

The FIFA World Cup has kicked off in Brazil, with fans travelling to the country from around the globe in the hope that their country’s football team will make it to the grand final. But if you’re travelling (whether it be to South America watch the world’s greatest soccer tournament, or a couple of days […]

By: - Independent Computer Security Analyst


Who Does China Blame for a Third of All Cyber Attacks Against It? The USA

March 31st, 2014

A few years ago, in what we call the BS era (“Before Snowden”), there were frequent accusations levelled against China for attempting to hack into foreign country’s computer systems and steal information. And, to be fair, there was often good reason to suspect that some attacks were conducted with the endorsement of the Beijing authorities. […]

By: - Dir. Solutions Marketing

160 New Viruses Captured Every Minute

February 17th, 2014

Periodically, I take a look at what the good folks at have to say about the amount of malware in their “zoo.” What I’ve been seeing over the past couple of quarters is pretty shocking. 2013 in Review The amount of new malware seen in 2013 jumped to an average of about 6.9M per […]

By: - Technology Reporter


Is Mobile Shopping Safer This Holiday Season?

November 26th, 2013

With the holiday shopping season upon us, scammers, cyber criminals and other nefarious characters come out of the Internet woodwork. Security experts are warning consumers should be cautious during the holiday shopping season to protect personal and financial data from being compromised. Banks and retailers should also be on high-alert. Consider just a couple of […]

By: - IT Security Expert

Employ a Targeted Defense Against Targeted Threats

November 11th, 2013

In my last post, I discussed the reality of APT hitting unsuspecting organizations with a predictable pattern. Study after study indicates people are being hit by malicious hackers and the attack goes on for months before anyone is any the wiser. If they ever know. Some very large companies, with hundreds of business units and […]

By: - Dir. Solutions Marketing

The Many Forms of Server-Side Risk

October 31st, 2013

We recently worked with the editors at SC Magazine on a reader survey about server-side risk. As expected, companies of all sizes are concerned about varied attack vectors that could allow bad-guy access to their mission-critical data. The results show that malware, server misconfigurations (which lead to malware intrusions) and targeted attacks (aka APTs) are […]

By: - Chairman and CEO, Lumension


Social Media: the Bad Guys’ Perfect Playground

October 1st, 2013

October marks the 10th anniversary of National Cyber Security Awareness Month, a public education campaign spearheaded by our colleagues at the National Cyber Security Alliance. It’s somewhat disheartening to consider the lack of progress made in cyber security over the last 10 years; cyber criminals continue to wreak havoc stealing personal identities, corporate IP, and […]

By: - Information Security Reporter


Safety Does Not Come First, Goodness, Truth and Beauty Come First

September 24th, 2013

I do not believe when Apple launched the iPhone it had some grand plan to change the very nature of how we work. If it had, the phrase would be Bring Your Own iDevice – and it would surely have been copyrighted. iDevices are consumer products, and as Jean Brodie said, “Safety does not come […]

By: - Technology Reporter


Malware Going Rogue

September 16th, 2013

A quick scan of news headlines shows the practical side of cybercrime. As you read this, a fake “Grand Theft Auto V’ torrent is racing to spread its infectious payload. An Advanced Persistent Threat (APT) called NetTraveler is doing its dirty work, most recently via a known Java vulnerability. Fake Xerox emails are delivering malware […]

A Win-Win for Missouri S&T

September 5th, 2013

Missouri University of Science & Technology faces a set of challenges many post-secondary organizations similarly face. On one side of the problem set, we have a whole fleet of student-owned endpoint devices—over 7,000—connecting to the network without any kind of centralized management because the university only has the means to manage campus-owned systems. On the […]

By: - Forensics and Security Expert


8 Bulletins, 3 Critical for August Patch Tuesday

August 8th, 2013

  IT departments will get a bit of a reprieve this August Patch Tuesday. While 8 bulletins may seem high at first glance, 3 of them are considered critical and just 1 – bulletin 1 – impacts the current code base. With 8 bulletins today, Microsoft’s year-to-date total is 65 patches. For anyone keeping track, […]

IT Secured. Success Optimized.™

Contact Lumension | Privacy Policy

Connect & Follow Us