All posts by Chris Tribbey

Who’s Scanning Your Network? Everyone (Krebs on Security)

Not long ago I heard from a reader who wanted advice on how to stop someone from scanning his home network, or at least recommendations about to whom he should report the person do... More

Weekend Vulnerability and Patch Report, May 17, 2015 (Citadel Information Group)

Important Security Updates Adobe Flash Player: Adobe has released version 17.0.0.188 to fix at least 18 vulnerabilities. Updates are available from Adobe’s website. Updates are ... More

Security Takes the Stage at May 14 HITS Conference (CDSA)

Hollywood IT execs today are undergoing the biggest ‘close-ups’ of their careers with a string of high-profile events keeping security top of every studio IT departments’ ‘... More

Hollywood Commission Report Looks at Revenue Sources of Piracy Sites (Torrent Freak)

A new Hollywood commission report investigating the revenue sources of more than 600 supposedly infringing sites has controversially included file-hosting site Mega. The listing ma... More

Trial of Torrent Site Admin and Hosting Provider Concludes (TorrentFreak)

An intriguing case dating back more than 3.5 years ended this week when two men went on criminal trial in Sweden. One was the former sysop of a 26,000 member private BitTorrent tra... More

RadioShack Is A Reminder That Old Data Don’t Die, Or Fade Away (Forbes)

A Delaware judge just gave RadioShack approval to consider bids for its customer data as part of its bankruptcy proceedings. Texas leads a list of states opposing the auction, citi... More

This Terrifying Malware Destroys Your PC if Detected (PC World)

A new type of malware resorts to crippling a computer if it is detected during security checks, a particularly catastrophic blow to its victims. The malware, nicknamed Rombertik b... More

Microsoft Bangs Cybersecurity Drum with Advanced Threat Analytics (Ars Technica)

Microsoft announced a raft of security and data protection software on the first day of its Ignite conference. The company said that attacks on companies were increasingly using le... More

Greater Cooperation Among Public, Private Entities Urged to Fight Cybercrime (Claims Journal)

Attorney General Loretta Lynch urged greater cooperation between the government and private industry to combat computer hackers, a key component of a new cyberattack playbook relea... More

Legal Landscape for Cybersecurity Risk is Changing (Inside Counsel)

In 2014, many of the most recognizable companies in America fell prey to cyber attacks. The list of victims is a veritable who’s who of corporate America: Target, J.P. Morgan Cha... More

A Cybersecurity Firm is Being Accused of Extorting Clients (Business Insider)

A bombshell lawsuit is raising eyebrows in the cybersecurity industry. A former cybersecurity forensic examiner named Richard Wallace is claiming that his former employer — cybe... More

Weekend Vulnerability and Patch Report, May 10, 2015 (Citadel Information Group)

Important Security Updates Apple Safari: Apple has released updates for Safari 8.0.6 for OS X Yosemite v10.10.3, 7.1.6 for OS X Mavericks v10.9.5, 6.2.6 for OS X Mountain Lion v10... More

Rovi Makes Metadata Offering a Standalone Service

Rovi Corp.’s metadata service, Rovi Knowledge Graph, is now available as a standalone service, the company announced May 5, a response to pay TV and broadband operators desire to... More

The Man Who Broke the Music Business (The New Yorker)

One Saturday in 1994, Bennie Lydell Glover, a temporary employee at the PolyGram compact-disk manufacturing plant in Kings Mountain, North Carolina, went to a party at the house of... More

Breaking The Security Fail Cycle (Dark Reading)

Security's heavy reliance and emphasis on technology--due to both its heritage and the reality of a shortage of manpower--is part of the reason attackers are getting the upper hand... More

Information Security: Identifying Your Weakest Links (Information Week)

In terms of identifying risk, plenty of content has centered on the idea of using existing tools to monitor security risk as opposed to investing in the many new systems on the mar... More

New DOJ Guidance Offers Tips for Cyber Incident Response (Federal Times)

During one of her first public appearances since being sworn in, Attorney General Loretta Lynch said she will focus on investigating and prosecuting cyber crimes and stressed the n... More

What’s Your Security Maturity Level? (Krebs on Security)

Not long ago, I was working on a speech and found myself trying to come up with a phrase that encapsulates the difference between organizations that really make cybersecurity a par... More

Use Data to Fight Industrialized Cyber Crime, Says RSA Fraud Head (Computer Weekly)

Fighting cyber criminals is all about collecting and using data, according to RSA head of anti-fraud services Daniel Cohen. “This includes collecting data on user behaviour, dat... More