Date: 13 October 2016

Author: cwilkinson

Don't Jump! How to Handle a Ransomware Attack

STEP:1 CALL BEDROC

Ransomware is obviously analogous to kidnapping, and dealing with the perpetrators can feel much like negotiating with a jumper standing on the edge of high-rise roof. The Institute for Critical Infrastructure Technology recently released a report that in part describes how to deal with criminals when they are holding your data hostage. The report talks of what to do once a breach has been found.

ICIT says the proper response will depend on the risk tolerance of the..

Date: 18 March 2014

Author: cwilkinson

Missed FireEye Alarms and 40 Million Stolen Credit Card Numbers: How Target Blew It

On Saturday, Nov. 30, the hackers had set their traps and had just one thing to do before starting the attack: plan the data’s escape route. As they uploaded exfiltration malware to move stolen credit card numbers—first to staging points spread around the U.S. to cover their tracks, then into their computers in Russia—FireEye spotted them. Bangalore got an alert and flagged the security team in Minneapolis.

Read more here...

Tweets