Fortscale Insider Blog

cybersecurity tools

30 Mar Good Tools Help Shortage of Cybersecurity Professionals

2015 has earned the dubious distinction of being the worst year ever for cybercrime, with nearly 1,000 major data breaches. Attacks included the theft of 21.5 million records from the federal government's OPM (Office of Personnel Management) and T-Mobile’s 15 million record data breach that exposed the names, addresses, and Social Security numbers of many of the company’s customers. To add...

Read More
Home Depot breach

29 Mar Home Depot to Pay at Least $19.5 Million to Consumers

A few years ago as I was finishing work on my new home, I walked into the local Home Depot and said to myself “I think I need at least one of everything in this store”. That was an exaggeration, but I did, and still do make a ton of purchases at Home Depot. When the massive Home Depot breach was...

Read More
breach

28 Mar Verizon Breach, It Can Happen To Anyone

Every year I anticipate the release of Verizon’s annual Data Breach Investigations Report. I’ve read it religiously for years. As a company that specializes in data breach security and helps countless organizations respond to and investigate security breaches, it’s ironic to say the least that Verizon just experienced a massive data breach of their own. Verizon recently reported that an attacker...

Read More
hacked

25 Mar Fort Friday Security Clips—Verizon hacked, OS X zero-day

Data for  1.5 million Verizon Enterprise customers is for sale in an underground cybercrime forum. Security journalist, Brian Krebs of KrebsonSecurity reports  that the hacker priced the entire package at $100,000 and was also offering the data in chunks of 100,000 records for $10,000 apiece. Interested buyers were offered an additional perk to purchase information about the security vulnerabilities found in Verizon’s enterprise client portal....

Read More
insider threats trend du jour

24 Mar Insider threats — Trend Du Jour

We've all heard that users can be a companies weakest link—whether deliberate or through negligence—employees (and ex-employees) are increasingly creating security risks within their organizations. With insider threats rapidly becoming the trend du jour—companies need to amp up vigilance. You also have to consider ex-insiders who may go rogue. In the recent Ofcom breach, an  ex-employee went rogue and handed over approximately six...

Read More
cybersecurity wakeup call

23 Mar Need for Cybersecurity Accelerates

Many years ago when personal computers were just starting to emerge, I got a phone call from my brother. He’d just started a cybersecurity company—one of the first. “Come work for me, I need your help” he implored. It seems ridiculous now, but although I agreed, I remember thinking “OK, I can do that for a while, but it doesn’t...

Read More
data manipulation

22 Mar Data Manipulation – Worse Than Theft

Over the years I’ve seen cybercrime evolve and take many different forms. From mere system access to much more egregious attacks like planting malware, stealing data, or denying service. All of these attacks can cause catastrophic damages, especially when data is stolen or compromised–potentially disrupting the lives of countless individuals and jeopardizing the very existence of the business. But there is yet...

Read More
Security breaches

21 Mar Security Breaches Often Underestimated

About a year ago the IRS reported that they’d been hacked. I remember it well, wondering if I was one of the 114,000 victims. The investigation found that the hackers had access to the entire tax returns of those compromised, including their social security numbers, home address, incomes, and every other sensitive bit of data included on their returns. I...

Read More
Fort Friday security blog

18 Mar Fort Friday Security Clips—FBI to Apple: Let me in, Ransomware: 216 Degrees Fahrenheit

The FBI is warning drivers to watch out for automobile malware attacks. ZDNet says the research highlighted that the car's 'attack surface', which consisted mostly of wireless components, could be used to transmit controller area network (CAN) messages to the electronic control units (ECU). It prompted Chrysler to recall 1.4 million vehicles and mail customers a USB drive with a...

Read More
AceDeceiver

17 Mar AceDeceiver, iOS Malware

A brand new malware strain was recently discovered by security researchers at Palo Alto Networks dubbed “AceDeceiver.” This new strain of iOS malware can successfully infect non-jailbroken devices and jailbroken devices alike. Security researcher and engineer, Claud Xiao writes at the Pala Alto Research Centr blog: "What makes AceDeceiver different from previous iOS malware is that instead of abusing enterprise certificates as...

Read More