Hackerspace Takes Fume Extraction Seriously

At first we laughed at the ridiculously over-the-top fume extraction system this hackerspace built for itself. Then we thought about seriously questionable donation rolls of solder some of the members managed to find and bring in. The kind of roll where the local greybeard assures you that a Californian State Trooper has permission to shoot you if you try to take it into the state, but damn does it solder well. They may be onto something is all we’re saying. But on a serious note, for a communal space like this one, a great air quality plan makes the place …read more

Continue reading Hackerspace Takes Fume Extraction Seriously

The Role of Money Mules in New Multi-Million Dollar Scams

I have written previously about CEO fraud where employees receive an email which appears to come from a company executive directing them to erroneously wire money to an overseas bank account. Now, fraudsters are redirecting their efforts to a new internal target: accounts payable. According to IBAN, the scam works this way: The fraudsters intercept emails or compromise…

The post The Role of Money Mules in New Multi-Million Dollar Scams appeared first on Speaking of Security – The RSA Blog.

Continue reading The Role of Money Mules in New Multi-Million Dollar Scams

Your Step-Up Authentication Compass… NIST & SMS – Finding North – Part 2

Authored by Greg Dicovitsky, Principal Solutions Architect, RSA In its recent solicitation for comment regarding its latest recommendation, the National Institute of Standards and Technology (NIST) has informed the public of its intent to eventually discontinue its recommending the use of Out-of-Band (OOB) Short Message Service (SMS) technologies to support the authentication of e-Commerce applications. [1]…

The post Your Step-Up Authentication Compass… NIST & SMS – Finding North – Part 2 appeared first on Speaking of Security – The RSA Blog.

Continue reading Your Step-Up Authentication Compass… NIST & SMS – Finding North – Part 2

The Most Important Visitor On Our Premises

A customer is the most important visitor on our premises, he is not dependent on us. We are dependent on him. He is not an interruption in our work. He is the purpose of it. He is not an outsider in our business. He is part of it. We are not doing him a favor…

The post The Most Important Visitor On Our Premises appeared first on Speaking of Security – The RSA Blog.

Continue reading The Most Important Visitor On Our Premises

Is Your Modern Marketing Cloud Infrastructure Vulnerable to Cyber Attacks?

You’ve just launched your new “Modern Marketing Platform” in the cloud. However, there are several potential problems that marketing teams may not consider when creating a new digital infrastructure in the cloud. I’m not referring to the websites set up for online banking or strictly for transactions, I’m talking about the web platforms that are built by the…

The post Is Your Modern Marketing Cloud Infrastructure Vulnerable to Cyber Attacks? appeared first on Speaking of Security – The RSA Blog.

Continue reading Is Your Modern Marketing Cloud Infrastructure Vulnerable to Cyber Attacks?

Best Advice for Digital Citizens – Stop. Think. Connect.™

October is kind of a big deal here at RSA. It’s National Cyber Security Awareness Month (NCSAM) and it gives us an opportunity to bring to the general public’s attention to a critical mission that we are focused on all year long – keeping businesses and individuals safe from cybercrime. It’s unfortunate that cybercrime is impactful…

The post Best Advice for Digital Citizens – Stop. Think. Connect.™ appeared first on Speaking of Security – The RSA Blog.

Continue reading Best Advice for Digital Citizens – Stop. Think. Connect.™

The Realm of Threat Intelligence – Attack Scenarios and Use Cases

The three previous blogs in this series have covered Packet Analysis, Log Analysis and Threat Intelligence; this final article aims to bring all of this information into one cohesive solution for any SOC or Cyber Defence organisation. For further reading on this subject please see our presentation at last year’s RSA Conference in Abu Dhabi…

The post The Realm of Threat Intelligence – Attack Scenarios and Use Cases appeared first on Speaking of Security – The RSA Blog.

Continue reading The Realm of Threat Intelligence – Attack Scenarios and Use Cases

POS Malware and Other Hacks Plague the Hospitality Industry

The days of making “analog accommodations” at hotels — filling out a reservation slip, taking ownership of a door key and having only a telephone handset to communicate with the outside world— are long over. Today’s hotels are rife with digital trapdoors, metaphorical sinkholes that have the capacity to compromise your personal information and identity.…

The post POS Malware and Other Hacks Plague the Hospitality Industry appeared first on Speaking of Security – The RSA Blog.

Continue reading POS Malware and Other Hacks Plague the Hospitality Industry

Cybersecurity takes center stage in US Presidential Debate

In the first US Presidential debate, held on the evening of September 27, 2016, one of three topics on the agenda for the candidates was “Securing America.” Debate moderator Lester Holt lead off this portion of the program with the following: “We want to start with a 21st century war happening every day in this…

The post Cybersecurity takes center stage in US Presidential Debate appeared first on Speaking of Security – The RSA Blog.

Continue reading Cybersecurity takes center stage in US Presidential Debate