Infosecurity.US

Information Security & Occasional Forays Into Adjacent Realms

  • Web Log

Miscreant Competition, The Olympics of Theft

November 21, 2018 by Marc Handelman in Card Skimmers, Financial Security, Financial Insecurity, Information Security

Online Thievery, that is. With two rival gangs running card skimming operations on a Brazilian sportswear manufacturer, the stakes for finishing first are high, and the downside is borne by the consumer...

November 21, 2018 /Marc Handelman
Card Skimmers, Financial Security, Financial Insecurity, Information Security

Magnetic Attraction, The Vetting Of The Magstripe →

May 20, 2018 by Marc Handelman in Fraud, Financial Security, Information Security

Brian Krebs as is his signum modus operandi, elucidates detective functionalities when those methods are brought to bear on fraudulent (in this case cloned) Debit and Credit Cards. Absolutely tremendous reportage, and today's MustRead.

May 20, 2018 /Marc Handelman
Fraud, Financial Security, Information Security

Primer →

June 23, 2017 by Marc Handelman in Blockchain, FinTech, Financial Security, Encrypted Currency, Fungibility

Well-now... a tightly-coordinated and well-crafted primer targeting Bitcoin and Ethereum, two ponderously heavier-than-air subjects, weighed down by lucre of-a-sort, and the need for encrypted fungibility. Enjoy.

June 23, 2017 /Marc Handelman
Blockchain, FinTech, Financial Security, Encrypted Currency, Fungibility

ATM Equals 'All The Money' →

May 03, 2017 by Marc Handelman in All is Information, Attack Analysis, Attack Vectors, Bank Security, Crime, Criminal Enterprise, Hardware Security, Information Security, Financial Security

John Leyden, writing at El Reg, tells the tale of the latest ATM SNAFU. All based on CVE-2017-6968... Astonishing, indeed.

"To exploit the vulnerability, a criminal would need to pose as the control server, which is possible via ARP spoofing, or by simply connecting the ATM to a criminal-controlled network connection," said Georgy Zaytsev, a researcher with Positive Technologies. "During the process of generating the public key for traffic encryption, the rogue server can cause a buffer overflow on the ATM due to failure on the client side to limit the length of response parameters and send a command for remote code execution." - via John Leyden, at El Reg

May 03, 2017 /Marc Handelman
All is Information, Attack Analysis, Attack Vectors, Bank Security, Crime, Criminal Enterprise, Hardware Security, Information Security, Financial Security

33c3, Mark van Cuijk's 'A World Without Blockchain' →

January 25, 2017 by Marc Handelman in All is Information, Conferences, Cryptocurrency, Cryptography, Financial Security, Information Security, Blockchain
January 25, 2017 /Marc Handelman
All is Information, Conferences, Cryptocurrency, Cryptography, Financial Security, Information Security, Blockchain

Decentralization and Governance, Definitive Screed →

August 24, 2016 by Marc Handelman in Blockchain, All is Information, Information Security, Financial Security

Fascinating screed via Phil Windley writing at his site - Technometria  on decentralization and governance - this time dealing with ledgers, blockchain and otherwise.

August 24, 2016 /Marc Handelman
Blockchain, All is Information, Information Security, Financial Security

Over One Billion Served →

February 17, 2015 by Marc Handelman in All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Suprised by the largest heist in history? Concerned about Carbanak APT? Clearly, proof-positive that advanced persistent threats are deeply evil - and highly efficient when coupled with other complimentary and stealth-like methodologies (aka Hiding in Plain Sight). Read on...

February 17, 2015 /Marc Handelman
All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Security, Must Read, Network Security, Security Failure, Security Governance, Bank Security, Social Engineering, Behavioral Security, APT, Persistent Threats, Moles

Defectum Securitas →

January 06, 2015 by Marc Handelman in All is Information, Common Sense, Data Security, Database Security, Financial Security, Information Security, Security Failure, Network Security

via VentureBeat's Evan Schuman, comes the sorry tale of enterprise security failures, and importantly, the continued failures of both security implementation and deployment in the recently high profile retail security snafus of last year [eg. Target's gargantuan credit and debit card breach]  Astonishing...

January 06, 2015 /Marc Handelman
All is Information, Common Sense, Data Security, Database Security, Financial Security, Information Security, Security Failure, Network Security

Rogers' Take, SONY Debacle →

December 23, 2014 by Marc Handelman in All is Information, Crime, Government, Information Security, Intelligence, Web Security, Network Security, Financial Security

Marc Rogers' take on the SONY [NYSE: SNE] incursions, with a step-by-step rebuttal of the ostensible involvement of the Government of North Korea. Mr. Roger's argument  - bolstered by the opinions of other, highly respected security professionals - is hardly surprising, yet satisfying in it's diametric view of the  Federal Bureau of Investigation's examination of the matter...

December 23, 2014 /Marc Handelman
All is Information, Crime, Government, Information Security, Intelligence, Web Security, Network Security, Financial Security

Infographica, The Timeline

September 12, 2014 by Marc Handelman in All is Information, Financial Security, Education, Cruft, Information Security, Infographica, Database Security
image.jpg


via the erudite Rapid7 blog

September 12, 2014 /Marc Handelman
All is Information, Financial Security, Education, Cruft, Information Security, Infographica, Database Security

Skimmers, Detailed

August 06, 2014 by Marc Handelman in All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Sciences, Information Security, Infosec Policy, Network Security, Physical Security

HTG explains the inner workings of nefarious card skimmers, installed to abscond with your personal login data and card number, all at your favorite local ATM... Read More

 

August 06, 2014 /Marc Handelman
All is Information, Cybernetic Crime, Data Security, Database Security, Financial Security, Information Sciences, Information Security, Infosec Policy, Network Security, Physical Security

NASDAQ, Purloined

July 21, 2014 by Marc Handelman in All is Information, Crime, Cybernetic Crime, Network Security, Racketeering, Financial Security

via Michael Riley, writing at Bloomberg Businessweek, comes the sordid tale, with film-noir-like building-blocks, of miscreant Russian nationals targeting the NASDAQ stock exchange, the kicker? They succeeded...

July 21, 2014 /Marc Handelman
All is Information, Crime, Cybernetic Crime, Network Security, Racketeering, Financial Security

Insert Here

July 10, 2014 by Marc Handelman in All is Information, Application Security, Cryptography, Data Security, Information Security, Network Security, Racketeering, Physical Security, Financial Security

Via the inimitable Brian Krebs, of Krebs on Security, comes reports of insert, thin and mini card skimmers, and the perils of automated banking and commerce for consumers worldwide. The astonishing component to this litany of miscreant evil-doers is the apparent inability of hardware manufacturers' to detect, notify and terminate these devices at will [or, at the very least, reject all cards on the machine when nefarious activities are suspected].

July 10, 2014 /Marc Handelman
All is Information, Application Security, Cryptography, Data Security, Information Security, Network Security, Racketeering, Physical Security, Financial Security