ANX Corporate Blog: Posts tagged as security threats

Showing 1 through 5 of 14 total posts

Aug 18th 2011, 20:39

DefCon 19 - Weaponizing Cyberpsychology

Posted by Steven Fox
Company X, a transportation company in the Midwest, had a well-managed external network infrastructure.  The few vulnerabilities that existed led to low-impact information breach that did not compromise corporate or customer information.  Satisfied with the status of their network security, I turned my attention to the human network.
Searching for the client name on sites like Twitter, Facebook, and LinkedIn, I discovered employee names and corporate activities that were not shared on its website.  As the search continued, the client's culture, processes, and lexicon emerged from the corporate dialogue. 
This information enabled me to persuade employees to give me access to critical information and secured areas. This included usernames,

Comment BubbleComments (0)

Aug 16th 2011, 18:10

ANX Profiles Franchise Security Breach in Live Webcast

Posted by Julie Pham
Enterprise Security Consulting Manager John Roskoph Walks Through a Franchise Security Breach Scenario and Discusses Causes, Consequences, and Safeguards to Protect Your Franchise Against a Possible Breach
Southfield, MI – August 17, 2011 – ANXeBusiness Corp. (ANX), a leading provider of managed security, compliance and connectivity solutions, today announced that it will host a live webcast on August 24, 2011, entitled “Profile of a Franchise Security Breach.” The Webcast will feature John Roskoph, enterprise security consulting manager at ANX.
In the complex distributed environment of franchises, sensitive customer data is processed, transmitted, or stored across a diverse range of sites, including POS locations, offices, warehouses,

Comment BubbleComments (0)

Aug 15th 2011, 10:54

DefCon 19 ReCap - Security When Nanoseconds Count

Posted by Steven Fox
High-speed trading - it's a reality often lost in the discussions of current financial challenges.  Much of the trading activity that drives the global economy occurs at speeds that exceed human capability.  Yes - computers conduct trades at nanosecond speeds based on mathematical algorithms.  These algorithms take into account information from global markets, futures trading, financial indicators, among other factors to make trading decisions.  Speed is money for these systems. Any devices that increases network latency - such as a firewall - means lost profits.
Security When Nanoseconds Count was a presentation at DefCon 19 where James Arlen discussed security in an environment where firewalls, access control lists, and system hardening are

Comment BubbleComments (0)

Apr 5th 2011, 10:31

Massive Email Security Breach at Epsilon

Posted by Curtis Blount
Epsilon, one of the world’s largest email marketing services companies and marketing unit of Alliance Data Systems Corp., announced on April 1 that an outside intrusion had hacked into some of its customer files. Epsilon sends e-mail campaigns and offers to consumers who register for a company's website or who give their e-mail addresses while shopping. Epsilon sends more than 40 billion e-mails annually and also runs loyalty programs for many large companies. Epsilon's databases house consumer information cybercriminals could use for targeted phishing, better known as spear phishing, attacks. 
At this point, it is unclear to the depth of this attack. What is known is the stolen data is limited to email addresses and possible user names associated with

Comment BubbleComments (0)

Mar 30th 2011, 12:13

Adobe Vulnerability Part 2 - Security Posturing

Posted by Curtis Blount
By now all of you are aware of the Adobe Zero-day vulnerability affecting both Adobe Flash and Reader. While patches have been released correcting this vulnerability, the question remains how do consumers (and by that I mean SMB, general consumers and Enterprises) protect themselves in the future. While we continue to state the obvious (and sometimes archaic) patches and malware protection, the reality is much more than that.
There continues to be an explosion of web applications in this rapidly expanding social web presence. The rush to deliver a product to market is more often over shadowed by good programming with a security focus.
Can the existing security technologies keep up with this explosion? Adobe is not the only vendor to deal with vulnerabilities, and they

Comment BubbleComments (0)