Entrust at RSA: Secure Mobile, Leverage Mobile
During RSA Conference 2013 at Booth 1139 this week, Entrust authentication experts Mike Moir and Mike Byrnes are showing how organizations are able to deploy a two-pronged approach to not only secure mobile identities and transactions, but also leverage mobile devices to secure the online channel.
Eurograbber Proves SMS Not Suited to Secure Bank Transactions
Last week, news was released that Eurograbber compromised user PCs and mobile SMS to execute financial fraud at 30 different banks across Europe.
Nitol Malware — Leveraging Dynamic DNS for Nefarious Gains
A malicious botnet called ‘Nitol’ was interrupted by Microsoft on Sept. 13. ‘Nitol’ was using a Dynamic DNS to enable the infected bot computers to communicate with the hacker’s command and control server. For background, it is possible to serve a website from a home computer, but the difficulty is that your home Internet service [Read More...]
The Token Debate: Why the RSA and ISACA Perspectives Are Wrong
While I would never claim to be a maven in the world of cyber security, I find it quite disturbing that a long-standing security vendor such as RSA would proclaim, “Since its (one-time-password token) inception, the world’s most respected security researchers have worked, unsuccessfully, to ‘break’ this technology.” Well, I can’t comment on the world’s [Read More...]
Command and Control
I recently attended the Black Hat USA 2012 in Las Vegas. During the conference, I focused my attention on cyberespionage. This involves attackers who are on a mission with well-defined objectives. They are a source of persistent, targeted attacks. I learned a lot about command and control during my training. Command and control — also [Read More...]