Fallout from the epic Target data breach continues, as state lawmakers seek to hold retailers liable for financial damages caused by breaches spawned by their businesses, rather than financial institutions who issue credit and payment cards.
Spec's, the fifth largest wine retailer in the US, has leaked 550,000 customers' card details, after some of its systems were compromised for close to 17 months.
Is a browser less secure if more people like to hack it? Is it OK to ignore alerts simply because you get too many? Do you back yourself to spot every single phish? And just how smart is the Google Play Store?
Chester and Duck dissect these issues with their usual style in this week's Chet Chat podcast...
Target's sophisticated security system went on full alert after detecting malware on the company’s network on 30 November last year and could have prevented the theft of 40 million credit and debit card numbers a few days later, according to a new report.
Following its recent epic breach, Target has announced that it's putting its technology through the wringer. Jacob will be the first high-level executive to leave since the incident.
Cybercrime is all about the money. And, in the end, that money leads back to the financial sector. Banks, credit unions, insurers and everyone charged with looking after our money and covering us when something bad happens are starting to feel the pinch from the steady growth in cybercriminality.
When we look at some of the biggest security headlines of the past year - Target data breach, Cryptolocker ransomware, Snowden/NSA leaks - there's one big lesson we can all be taught: secure everywhere.
Former employees and others familiar with the breach investigation said at least one analyst recommended a thorough security review prior to Target's upgrading its payment system. Did the review actually happen, or was it lost in the cacophony of warnings security teams and government agencies constantly put forth?
Where do you find Extreme Spammers? Can you find the exploit unicorn? And how did Target get breached?
Find out in 60 Sec Security for 08 Feb 2014...
Intrepid chronicler of the Target breach, Brian Krebs, has uncovered yet another cog in the criminal gearbox behind Target's data disaster.
Guess what? 2FA and network segregation would have made things a lot harder for the crooks...
Chet and Duck review the week's news in their informed and entertainingly serious style, discussing the prizes on offer at this year's PWN2OWN competition, talking about a new twist in Android malware, and reviewing the latest attack reports from Yahoo and Target...
The company has reportedly shut down remote access to at least two internal systems: one for HR and one for suppliers. And yes, the DOJ is investigating this, one of the biggest breaches of all time.
The US Federal Bureau of Investigations (FBI) has warned retailers to harden their defences against cyber-heists - particularly those that latch onto credit card details from shoppers
A Naked Security reader just received Target's advisory letter saying she'd been part of the recent breach. But she didn't find it as clear as perhaps it could have been.
Paul Ducklin takes a look...is there anything Target could have done differently?
Hot on the heels of the massive Target data breach, retail group Neiman Marcus has confirmed a mid-December security breach and that an undisclosed number of payment cards have been compromised.
The Target data breach story has turned into a bit of a bus: it's big, has lots of momentum, and three just came along at once.
First: 40M payment card details stolen. Second: 70M names, addresses and the like stolen. Third: looks like there was a specialised botnet involved.
US megaretailer Target is having a tough time of it.
Having said that, so are its customers - and even, as it now turns out, many of its non-customers, too.
Target has now joined companies like Adobe and Sony in the "hundred million plus" data breach club...
Our weekly security podcast looks back at the big blunders of 2013 to find out what went wrong.
Let Chet and Duck help you plan for a safer and more secure 2014!
Chet and Duck help you to learn from recent security news, both good and bad.
In this episode: the massive Target breach; Microsoft's and Apple's attitude to updates; and how to respond to Google's recent changes to image rendering for Gmail users.
What prison sentence for the man who pioneered online carding? How many credit cards did Target lose? Does your encryption software "speak" to passers-by? How to keep your kids safe online over the holidays?
Find out in 60 seconds!