6 Results from 2012
Uri Rivner CEO and Co-Founder at Refine Intelligence
A couple of weeks ago I got a LinkedIn invitation from someone called Tricia Bennett. I don’t know Tricia, and in such cases I’ve developed a best practice of first asking “hey mate, do I know you from somewhere”? What’s the rationale for linking yourself professionally only to people you’ve actually met? Well, other than general common sense, it’s...
28 August 2012 /security Information Security
Here are some further thoughts on the LinkedIn compromise, following my previous blog post. Over the years I did some unscientific research on LinkedIn. Here’s some unofficial statistics I have on LinkedIn accounts: about 25% of LinkedIn users use their real corporate email account as the user name. That’s not a good practice for many reasons, som...
13 June 2012 /security Information Security
The recent LinkedIn accounts compromise in which 6.5 million password hashes were published in the Russian hacker community grabbed a lot of media attention. In a hellish period of publicly known breaches that hit the front page news, with perimeter security defenses failing left and right in any possible vertical and geography, this incident stirs...
11 June 2012 /security Information Security
The Eternal Flame is something you’ll probably recognize as the ever burning fire in ancient Greece; but in fact it has deeper roots in the Middle East. The first records of such custom are, interestingly enough, set in ancient Iran and Israel. The security industry’s skies are now alight with Flame, the latest discovery in the chain of super-grad...
30 May 2012 /security Innovation in Financial Services
I was waiting at the British Airways lounge for my connection flight when my eyes caught the cover of a BusinessWeek magazine. “Hey China”, it said, “Stop Stealing Our Stuff!” In the last 2 years there has been a dramatic surge of Advance Persistent Threat attacks – military grade cyber attacks against commercial targets. Many of these attacks wer...
23 May 2012 /security Innovation in Financial Services
It’s a new, exciting era for Trojan builders. The mobile space in 2012 is a virginal, unchartered territory that attracts the talent and creativity of black hatters and malware writers like moths to a flame. If you think about it, the entire mobile security space has huge ‘Here there be monsters’ sections where the cartographers don’t really know ...
26 March 2012 /security Innovation in Financial Services
Welcome to Finextra. We use cookies to help us to deliver our services. You may change your preferences at our Cookie Centre.
Please read our Privacy Policy.