Why Phone Numbers Stink As Identity Proof

Phone numbers stink for security and authentication. They stink because most of us have so much invested in these digits that they’ve become de facto identities. At the same time, when you lose control over a phone number — maybe it’s hijacked by fraudsters, you got separated or divorced, or you were way late on your phone bill payments — whoever inherits that number can then be you in a lot of places online. Continue reading Why Phone Numbers Stink As Identity Proof

MyEquifax.com Bypasses Credit Freeze PIN

Most people who have frozen their credit files with Equifax have been issued a numeric Personal Identification Number (PIN) which is supposed to be required before a freeze can be lifted or thawed. Unfortunately, if you don’t already have an account at… Continue reading MyEquifax.com Bypasses Credit Freeze PIN

Open-Source & Free Collaboration Security Tools – Enterprise Security Weekly #123

Paul and Jeff Man talk about Open-Source and free collaboration security tools. 1. Project Planning – OrangeScrum 2. Ticketing – Mantis Bug Tracker 3. Documentation – MediaWiki 4. Zabbix – Remote System Monitoring 5. Feedly &#82… Continue reading Open-Source & Free Collaboration Security Tools – Enterprise Security Weekly #123

SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines

In its raw form, log data is almost impossible for a human to process, so advanced SIEM solutions conduct a process called event normalization to deliver a homogeneous view.

The post SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines appeared first on Security Intelligence.

Continue reading SIEM Event Normalization Makes Raw Data Relevant to Both Humans and Machines

What the Marriott Breach Says About Security

We don’t yet know the root cause(s) that forced Marriott this week to disclose a four-year-long breach involving the personal and financial information of 500 million guests of its Starwood hotel properties. But anytime we see such a colossal intrusion go undetected for so long, the ultimate cause is usually a failure to adopt the most important principle in cybersecurity defense that applies to both corporations and consumers: Assume you are compromised. Continue reading What the Marriott Breach Says About Security

How to Shop Online Like a Security Pro

‘Tis the season when even those who know a thing or two about Internet scams tend to let down their guard in the face of an eye-popping discount or the stress of last-minute holiday shopping. So here’s a quick refresher course on how to make it through the next few weeks without getting snookered online. Continue reading How to Shop Online Like a Security Pro

Patch Tuesday, November 2018 Edition

Microsoft on Tuesday released 16 software updates to fix more than 60 security holes in various flavors of Windows and other Microsoft products. Adobe’s also got security patches available for Flash, Acrobat and Adobe Reader users. 
The post Patch… Continue reading Patch Tuesday, November 2018 Edition

How Much Is Endpoint Management Really Costing You?

Many organizations are paying much more than they realize for endpoint management in terms of money, resources and speed. Where do these hidden costs come from, and how can companies reduce them?

The post How Much Is Endpoint Management Really Costing You? appeared first on Security Intelligence.

Continue reading How Much Is Endpoint Management Really Costing You?

Credit Freezes are Free: Let the Ice Age Begin

It is now free in every U.S. state to freeze and unfreeze your credit file and that of your dependents, a process that blocks identity thieves and others from looking at private details in your consumer credit history. If you’ve been holding out because you’re not particularly worried about ID theft, here’s another reason to reconsider: The credit bureaus profit from selling copies of your file to others, so freezing your file also lets you deny these dinosaurs a valuable revenue stream. Continue reading Credit Freezes are Free: Let the Ice Age Begin

U.S. Mobile Giants Want to be Your Online Identity

The four major U.S. wireless carriers today detailed a new initiative that may soon let Web sites eschew passwords and instead authenticate visitors by leveraging data elements unique to each customer’s phone and mobile subscriber account, such as location, customer reputation, and physical attributes of the device. Here’s a look at what’s coming, and the potential security and privacy trade-offs of trusting the carriers to handle online authentication on your behalf. Continue reading U.S. Mobile Giants Want to be Your Online Identity