Tag Archives: hacking

It may surprise a few people, but I’m just not worried about my credit card being stolen. In fact, I refuse to worry about it. That may sound like heresy for someone who is supposed to know a little bit … Continue reading

Posted in Botz Blog, Cloud Security, Info Security Mgmt, Information Security, Mobile Security, Security Breach | Tagged , , , , , | Leave a comment

CAUTION: RANT ALERT On Wednesday, November 19, Admiral Michael Walters, the head of the NSA made a very disturbing announcement. He said that China and one or two other countries have the capability to launch a cyber attack that could … Continue reading

Posted in Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , | Leave a comment

  Patrick Townsend and I had a chance to catch up at COMMON earlier this year. I was psyched to learn that Townsend Security is now offering Two Factor Authentication (2FA) for the IBM i. When we started talking about … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security, Single Sign-On (SSO), Two Factor Authentication | Tagged , , , , , , , , | Leave a comment

Did you ever think that the potential cost of a security breach is overstated by those who want to sell you security software or services? Well, no matter how you add it up,  the potential cost to Target during the … Continue reading

Posted in Botz Blog, Compliance, IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , , , , | 1 Comment

On January 10th, 2014, Target Corporation released an update that personally identifiable information “separate from the payment card data previously disclosed” of an additional 70 million customers was stolen.  The update from Target addresses many of the questions I had based … Continue reading

Posted in Botz Blog, Information Security | Tagged , , , , , , | Leave a comment

Within the last week we’ve seen two high profile attacks announced.  The Washington Post newspaper and retailing giant Target both announced that they were the target (pun intended) of attacks. Both are troubling. The Target store attack has the potential … Continue reading

Posted in IBM i Security, Info Security Mgmt, Information Security | Tagged , , , , , , | 1 Comment

A popular password cracking tool was recently updated to handle passwords up to 55 characters in length. The tool, ocl-HashCat-Plus, was previously limited to passwords up to 15 characters long.

Posted in Biometrics, Botz Blog, IBM i Security, Information Security, Mobile Security, Single Sign-On (SSO) | Tagged , , , , , | Leave a comment

How many times have you heard someone say “Nobody would want to attack my computer.”?  I’ve heard it too many times to count. I even hear it from some of the businesses I work with. Well Brian Krebs, author of … Continue reading

Posted in Info Security Mgmt, Information Security, Social Engineering | Tagged , , , , , | Leave a comment

Evernote had its share of stress last week. Proactively resetting 50 million users’ passwords may be the best way to handle a security breach once it happens, but why did it happen at all? Read the backstory here and learn … Continue reading

Posted in Cloud Security, Info Security Mgmt, Information Security, Mobile Security | Tagged , , , , | Leave a comment

A recent attack hit real close to home!

Posted in Info Security Mgmt | Tagged , | Leave a comment