Menu

e-bay Security Practices under investigation by US States      

Biggest ever Distributed Denial of Service (DDoS) attack on Cloudfare Networks       

Bitcoin Exchanges continue to suspended withdrawal operations      

Snowden accessed NSA confidential data using web scrapping tools      

Barclays Bank probing the breach of client data sold to rogue City traders      

New Snapchat Flaw Can DoS and Spam iOS and Android       

Possible misuse and loss of customer data at Barclays Bank

Published on: 2/10/2014

A whistleblower at Barclays bank raised the issue for possibility of data loss and subsequent misuse of approx. 27,000 files containing detailed personal data of Barclays customers and potential customers. The files may have reached in the hands of 'spank shops.'

A whistleblower at Barclays bank raised the issue for possibility of data loss and subsequent misuse of approx. 27,000 files containing detailed personal data of Barclays customers and potential customers. The files may have reached in the hands of 'spank shops.'

Barclays issued a statement on Sunday. "Our initial investigations suggest this is isolated to customers linked to our Barclays Financial Planning business which we ceased operating as a service in 2011. Based on what we have seen, this appears to be data from 2008 or earlier."



Snowden accessed NSA confidential data using web scrapping tools

A senior intelligence official at NSA disclosed that Mr. Edward J. Snowden used very low cost web crawling tools to scraped data from NSA documents. Note that NSA have top grade security to protect against outside attacks and also responsible for protecting nation's sensitive military and intelligence computer systems from cyberattacks.
Read More

How Ransomware turns your computer into a bitcoin miner

Linkup is the latest ransomware asking victims for a payment to undo damage to their computers. Security researchers have identified a new type of “ransomware” which blocks internet access and turns users’ computer into a bitcoin miner pending payment of a ransom. The malware, named by researchers at Emsisoft as “Trojan-Ransom.Win32.Linkup”, differs from previous examples of ransomware. “It does not directly lock your computer or encrypt files,”...
Read More

2014 New Year Resolution: Disaster Recovery

Looking back, I can see at least three different New Year’s resolutions that I totally failed, but as CIO of a Tech Support Company, failure really isn’t an option. I am talking about backup and disaster recovery. Our failure means our client’s failure, and we won’t stand for that. In order to avoid failure in the disaster recovery area, it’s always best to plan ahead - and the beginning of a new year is one of the best times to do so. Please tak...
Read More

Q: What are some standard computer industry security best practices?

A: In answering this question we are extremely pleased to pass along technology and security know-how to you in this article. Here are some standard computer industry security best practices for you to consider. Install a Firewall Security Appliance. Security Appliances are special devices at the edge of your network that monitor the activity of external connections, primarily the Internet, to an internal network. Firewalls help to eliminate the...
Read More