When a retailer’s credit card systems get breached by hackers, banks usually can tell which merchant got hacked soon after those card accounts become available for purchase at underground cybercrime shops. But when companies that collect and sell sensitive consumer data get hacked or are tricked into giving that information to identity thieves, there is no easy way to tell who leaked the data when it ends up for sale in the black market. In this post, we’ll examine one idea to hold consumer data brokers more accountable.
Treasury Dept: Tor a Big Source of Bank Fraud
A new report from the U.S. Treasury Department found that a majority of bank account takeovers by cyberthieves over the past decade might have been thwarted had affected institutions known to look for and block transactions coming through Tor , a global communications network that helps users maintain anonymity by obfuscating their true location online. The findings come in a non-public report obtained by KrebsOnSecurity that was produced by the Financial Crimes Enforcement Network (FinCEN), a Treasury Department bureau responsible for collecting and analyzing data about financial transactions to combat domestic and international money laundering, terrorist financing and other financial crimes.
Sony Breach May Have Exposed Employee Healthcare, Salary Data
The recent hacker break-in at Sony Pictures Entertainment appears to have involved the theft of far more than unreleased motion pictures: According to multiple sources, the intruders also stole more than 25 gigabytes of sensitive data on tens of thousands of Sony employees, including Social Security numbers, medical and salary information. Screen shot from an internal audit report allegedly stolen from Sony and circulating on file-trading networks. Several files being traded on torrent networks seen by this author include an global Sony employee list, a Microsoft Excel file that includes the name, location, employee ID, network username, base salary and date of birth for more than 6,800 individuals
How to Configure Syslog Nodes in SolarWinds Log & Event Manager
Download your free trial: http://bit.ly/Configure_Syslog_Nodes Learn how to configure Server Nodes with SolarWinds Log & Event Manager. Connect with SolarWinds: thwack Community: …
How to Deploy SolarWinds Log & Event Manager with VMware
Dowload your free trial: http://bit.ly/DeploywithVMware This is a step-by-step guide on how-to import the VMware Virtual Appliance into SolarWinds Log & Event Manager. Connect with SolarWinds:…
How to Troubleshoot Syslog Nodes in SolarWinds Log & Event Manager
Download your free trial: http://bit.ly/Troubleshoot_Syslog_Nodes A step by step guide to troubleshooting Syslog nodes in SolarWinds Log & Event Manager. Connect with SolarWinds: thwack …
How to Use Reports to Search and Analyze Log Data with SolarWinds Log & Event Manager
Download your free trial: http://bit.ly/Use_Reports A step by step guide on how- to use reports to search and analyze log data within SolarWinds Log & Event Manager. Connect with SolarWinds:…
How to Use nDepth in SolarWinds Log & Event Manager
Download your free trial: http://bit.ly/Use_nDepth A step by step guide showing you how to use nDepth in SolarWinds Log & Event Manager. Connect with SolarWinds: thwack Community: http://thwack.s …
Find and Fix IP Conflicts in Two Clicks
For more information visit: http://bit.ly/IP-Control-Bundle IP conflicts can be difficult to troubleshoot and fix.In this guided tour we’ll introduce you to SolarWinds® IP Control Bundle…
Black Friday black out protection with HAProxy
The media industry had lots of fun at the expense of e-commerce outlets on Black Friday mercilessly reporting on site crashes and outages . My wife yelled that I needed to ‘fix the Internet’ when Argos.co.uk would not respond immediately to her demands on Friday evening.