|

Disaster Preparedness for Personal Information Assets

From the Desk of Chad M. Barr, CISSP, CISA September is “Disaster Preparedness Month.” It’s important to consider how we safeguard our information in the event of a natural disaster, man-made event, or even a system failure. This newsletter will discuss some steps you can take to secure your critical information and some best practices…

| | |

Anonymisation service uses botnet as proxies

Anonymization service AWM Proxy rents computers infected with the TDL4 bot for use as proxies, according to a report by a security expert. Starting at $3 per day, users can have their data traffic directed through the bot network to surf the Internet anonymously with other people’s IPs. The researcher said the provider has been…

|

Microsoft and Adobe preview September Patch Tuesday

Patch Tuesday. When it releases its monthly patches September 13, Microsoft will publish five bulletins categorized as “important” to close 15 holes. Most of the bulletins fix vulnerabilities in Microsoft Office, which attackers can use to inject malicious code and escalate rights. Arbitrary code can also be executed in the Mac edition of Office, and…

| |

Phishing Alerts — Fake Traffic Tickets & False Credit Union Messages

From the Desk of Chad M. Barr, CISSP, CISA, PCI QSA There have been a number of recent “phishing” campaigns, which are attempts by individuals or groups to solicit personal information from unsuspecting users by employing social engineering techniques. This month’s newsletter will focus on some of recent campaigns and provide guidance for protecting yourself…

|

PCI Council revokes company’s QSA status

Merchants that use Scottsdale, Ariz.-based security services provider Chief Security Officers (CSO) to validate their adherence with the Payment Card Industry Data Security Standard (PCI DSS) will have to find a new assessor. The PCI Security Standards Council, the group responsible for managing payment security, last week revoked CSO’s status as a Qualified Security Assessor…

|

Cyber Crime: How It Happens And How You Can Protect Yourself

From the Desk of  Chad M. Barr, CISSP, CISA An increasing number of domestic and international criminals are using the Internet for illegal purposes. Computers and other electronic devices can be used to commit crimes. This newsletter will discuss who are potential  targets, the nature of computer and cyber crime, and what you can do…