Monitoring real-time network behavior

Blog originally published by FlowTraq™, authored by Dr. Vincent Berk. Yesterday, Adobe Systems revealed it was the victim of sophisticated cyber attacks on its networks by hackers who accessed data belonging to 2.9 million customers along with the source code for at least two of its software titles. Source code repositories are a typically bastions […]

Ernst & Young questions UK Organizations IT Security

Blog originally published by FlowTraq™, authored by Larry Nuttall In his article, “IT security at 96 per cent of UK businesses“, Computing UK author Sooraj Shah reacted to the Ernst & Young Global Information Technology Survey released in October 2013. “Only four per cent of UK organisations have IT security functions that fully meet their […]

Preventing Website Breaches

No company no matter how big is immune to a cyber attack Blog originally published by FlowTraq™, authored by Dr. Vincent Berk The highly publicized Apple Developer website breach, which left upwards of 100,000 records with personal names, mailing addresses and emails potentially accessed by intruders released little detail about the situation, which may mean […]

Data exfiltration

At the end of the day, all that matters is that data is being stolen Blog originally published by FlowTraq™, authored by Dr. John Murphy Data exfiltration from major US weapons manufacturers have put Chinese data hacking back in the news again. The debate over the instigators of these major data leaks continues, with some […]

Password attacks

Brute Force Attacks Prey on Common Password Combinations Brute-force attacks on password-protected software are simple but regrettably effective: an attacker gets a list of common usernames and a large set of common passwords, and makes hundreds or thousands of connections to find a pair that works. Once it does, they’ve got access to your system. […]

Defend against data theft with a “network security guard”

There’s a difference between what’s usual and what’s unexpected. Blog originally published by FlowTraq™, authored by Dr. John Murphy The security guard or the receptionist at your building entrance know the people who work there and their usual habits.  They know delivery schedules and the usual drivers.  They know which doors are usually kept closed. […]