Software Defined Radio: A Hacker’s Dream

Wireless cameras, RFID key cards, keyboards, cordless phones, just about every wireless technology that isn’t light- or sound-based will attract a hoard  of researchers (and attackers) looking at ways to exploit  them. Are you prepared? It is now known that your car’s GPS, toaster and medical devices are vulnerable to attack.  For the most part, built without…

Details

Trustwave Acquires Application Security Inc.

Trustwave announced on Monday that it had acquired data security provider Application Security Inc., for an undisclosed sum as Trustwave continues its strategy of acquiring security technology vendors to spur its growth. Eleven-year-old Application Security evolved from web scanning and column encryption of databases to a complete database protection company. Competitors include California-based Imperva and Israel-based GreenSQL.…

Details

HyTrust Acquires Competitor HighCloud Security

Cloud security provider HyTrust Inc. said on Thursday it had acquired HighCloud Security for an undisclosed sum, striking a deal it said would round out its security offering. The move follows HyTrust’s $18.5M Series C financing round in August and comes as enterprises increasingly deploy private cloud services. HyTrust said that it had quadrupled its sales…

Details

New Certification Launched for Healthcare Information Security and Privacy Professionals

Insurance fraud. Identity theft. Financial fraud. These are just a few of the risks associated with storing personal healthcare information online. Healthcare organizations hold some of the most private and sensitive information, and if it were to be comprised, a breach of this data could have serious repercussions for individuals and organizations alike. To address…

Details

Can’t Touch This? Researchers Successfully Eavesdrop on Contactless Cards

Contactless card transactions are becoming increasingly popular in the United States, Europe and Asia. In the United Kingdom alone there are some 34.5 million cards in issue with contactless functionality according the UK Cards Association. With contactless payments no signatures or PINs are required for authorization.  This makes transactions under approximately $35 dollars quick, occurring…

Details

YAC/YAM, Log Management, SIEM and Big Data Security Intelligence

Maybe it’s just me, but many market analysts tend to be skeptical about the latest shiny new thing promising the “complete solution” in security and other technology initiatives. Skepticism is fueled by the constant stream of overlapping tools, enhancements and nuanced products promising to do something “more;” but with functionality that ultimately may become features in…

Details

Firmware Attacks on the Uptick

Firmware attacks are growing increasingly popular among software hackers. Despite efforts to issue patches for firmware, reported attacks are on the uptick. For instance, Ruben Santamarta, a security researcher at IOActive, recently posted a blog in which he describes how he directed the firmware of a counterfeit money detector to force the system to literally accept any piece of…

Details