Blog Posts Tagged with "Verizon"


New Mobile Security App for Android Smartphones

September 27, 2012 Added by:Robert Siciliano

As more online retailers introduce mobile e-commerce applications, criminal hackers are taking notice. Existing mobile operating systems are under attack and, like standard PC operating systems, they sometimes fail to provide the necessary security to support a payment application...

Comments  (1)


Verizon 2011 Data Breach Investigation Report Summary

March 22, 2012 Added by:Headlines

"Mainline cybercriminals continued to automate and streamline their method du jour of high-volume, low-risk attacks against weaker targets. Much less frequent, but arguably more damaging, were continued attacks targeting trade secrets, classified information, and intellectual property..."

Comments  (0)


Four Keys for Intellectual Property Protection

February 07, 2012 Added by:Jason Clark

Intellectual property includes product designs, secret formulas, and other trade knowledge. It's what organized cybercrime, state governments and hackers are all going after. Why? Mostly because of the value. One stolen manufacturing process can be worth millions...

Comments  (1)


What Does Verizon’s 2011 DBIR Mean to Your Enterprise?

July 24, 2011 Added by:Robb Reck

It’s not easy to go through every system in our environment and ensure that remote administration is turned off where it can be and closely monitored where it cannot, but it is simple; if you don’t know where the doors into your data are, you can’t defend them...

Comments  (3)


Data Breaches Are Up While Lost Records Are Down

July 06, 2011 Added by:Robert Siciliano

There are now multiple breach lists, and not all define a data breach the same way. According to the Identity Theft Resource Center, there were at least 662 data breaches in 2010, which exposed more than 16 million records. Nearly two-thirds of breaches exposed Social Security numbers...

Comments  (0)


Verizon Report: Hackers Target Small Businesses

May 26, 2011 Added by:Kelly Colgan

Hackers are changing their tactics and chasing opportunities. Black hats are honing in on lower-tier business targets—organizations with less savvy, maturity and investment in countermeasures. Once they identify vulnerability, they exploit it...

Comments  (0)


Notes on the Verizon 2011 Data Breach Investigations Report

April 30, 2011 Added by:Anton Chuvakin

Log reviews detect breaches LESS OFTEN than “happenstance discovery by unrelated 3rd party”. Why? Because you ain’t doing that log review, and so random people stumbling on your weeks-old breach evidence is more "effective" than your log analysis. This is how bad things really are...

Comments  (0)


Verizon: Total Data Loss is Down as Breaches Increase

April 19, 2011 Added by:Headlines

"There has been a shift in the threat landscape, and organized crime is targeting medium to small-sized businesses in the US. What we're seeing is the bad guys exploiting people who haven't taken basic security considerations into account in their small business..."

Comments  (0)


Verizon Unveils Threat and Breach Reporting Portal

November 16, 2010 Added by:Headlines

Verizon has launched an anonymous breach reporting website with ICSA Labs called VERIS in an effort to elicit and consolidate data on security threats that are often isolated in disparate information silos or that remain unreported entirely...

Comments  (0)