The PCI SSC has released version 2.0 of both the Card Production Logical Security Requirements and the Card Production Physical Security Requirements. Both documents are now available on the Document Library. Why should many of you be interested in taking a closer look at both documents? The documents start with a scoping definition: Logical: “All systems … Continue reading Updated PCI Card Production Standards
New Cashout Malware Dubbed Alice
Last week Trend Micro wrote about a new ATM Malware Variant Alice. This discovery was unique, as this malware was found to have very specific goals, and very little interaction. This malware had been designed to allow a thief to view the bill count and denomination in the ATM, and specifically target those bills until the … Continue reading New Cashout Malware Dubbed Alice
The Importance Of Employee Awareness Training
I read an interesting article on Dark Reading The Human Firewall: Why People are Critical To Email Security and thought it struck a common theme I see with many clients. There is constant stress on the “NextGen” controls that can be put in place to serve as an Organization’s silver bullet, yet employee awareness training is often … Continue reading The Importance Of Employee Awareness Training
Podcasts Are My Go To Source For Information
I have come to rely on podcasts for all sorts of news and entertainment, including in the ever evolving world of computer security. Some of these shows are quick new recaps to help me keep up with the bigger headlines while keeping my inbox as light as possible. Others are deep dive shows where you … Continue reading Podcasts Are My Go To Source For Information
Combating the Rising Threat of “Smart” Devices
This was originally posted as an INSIGHT for Wolf & Company, P.C. here Continuing our series of takeaways from DEF CON 24 – last month we discussed How Hackers Are Attacking Mobile Devices – we’re turning the focus to Anthony Rose’s presentation, “Picking Bluetooth low Energy Locks from a Quarter Mile Away.” This presentation is particularly relevant … Continue reading Combating the Rising Threat of “Smart” Devices