TBG Blog Network Security

17May

Verizon has just released the 2014 security breach report, which analyzes the security breaches and attacks form 2013. They found 198 total instances that they worked on with all 198 having confirmed data disclosed. The common method of attack is to install malware on POS systems and collect magnetic strip data that is in process, […]

Read More

13May

Smartphones are being stolen at an alarming rate in the US over the past few years. This should be a concern as more company’s are looking to implement BYOD. A study also discovered that one in ten smart phone users are victims of device theft with only 30% every getting their smartphone back. The most […]

Read More

10May

  Symantec just stated that Ant-Virus is dead. That is a very bold statement, one that I happen not to agree with. The better statement would have been is Anti-Virus is not very effective or is not the only tool needed to maintain a security posture. While Anti-Virus is not catching the most current attacks […]

Read More

09Feb

I was recently at a very interesting conference. They discussed the risk of advanced persistent threats also known as (APT). Advanced persistent threats are basically threats that bypass your security and can constantly talk to the attacker. I am going to walk you through a quick example of how this works. The Chinese government has […]

Read More

02Feb

Hackers are exploiting a weakness in Internet security, ad makers and sellers that target user’s online browsing habits. Recently, Yahoo displayed and advertisement that contained malicious malware to European for at least one week. Additional high traffic websites have had malicious code injected into their display ads, newspapers, blogs and Dailymotion, a popular destination for […]

Read More

13Mar

Java has been the source of numerous security vulnerabilities as of late.  The question is, is it time to disable Java? A flashback Trojan breached Macintosh computers. You should disable Java in your web browser if you can. If you need to use Java for certain applications, you should  run an updated Java in that […]

Read More

27Dec

When was the last time you have tested your backup. Have you ever performed a drill to test how quickly it would take you to recover? Recently, I was headed out on a vacation and a client had a disaster with a SAN crash. After calling the SAN Vendor, we discovered the data was corrupted. […]

Read More

29Sep

I have talked to numerous people that believe Apple and their products are very secure, I have listed a security breach into Apple’s Apple ID that might make you think twice about that. It is also a read into cloud security and some things that  you should not do. Mat Honan’s Compromise  Mat Honan is […]

Read More

28Jun

If you shop online, you want to make sure that you are using a credit card instead of a debit card to protect your bank account from online attacks and scammers. The advantage your credit card has over your debit card is you only have a $50 loss if it is stolen and most times […]

Read More

22Feb

So How do we protect against You? I was asked to prepare a presentation on secuirty and during my research, I discovered that a big part of Information Security is You. What do I mean by You? The easiest and most profitable way to attack someone is to utilize some social engineering or phishing attack. […]

Read More