KSoutherland

About Kristin Southerland

This author has not yet filled in any details.
So far Kristin Southerland has created 40 blog entries.

Bitcoin

2017-05-08T12:18:03-05:00

In 2008, a surprising practical application of electronic currency came into use. This week, we look at what is now known as the Bitcoin; how it works and what it might mean to online economic development. The Internet has grown, and commercialization has brought in worldwide participation. An open exchange of ideas and business models [...]

Bitcoin2017-05-08T12:18:03-05:00

EMV Lag

2017-05-10T14:11:37-05:00

Back in January of 2016, the food chain Wendy's made the news for a Point of Sale (PoS) data breach. As the details have slowly emerged, it has revealed several good and bad points about the way American retailer payments systems are changing. Not surprising to many, the US has the oldest and most [...]

EMV Lag2017-05-10T14:11:37-05:00

What is the Deep Web?

2017-04-18T15:24:00-05:00

This post we look deeper into the poorly understood world called the Deep Web. We'll take a look at how large this hidden realm might be and the types of activities that take place far below the surface world of Google and Facebook. Oddly enough, we seem to be surrounded by references to the [...]

What is the Deep Web?2017-04-18T15:24:00-05:00

What is Vishing?

2017-04-18T15:24:38-05:00

In a previous post, we covered Phishing and Spear Phishing. Another trend to be watchful for is a variation of these over mobile platforms. The concepts of "Smishing" and "Vishing" are targeted at mobile electronic devices and work in the same manner as phishing tactics. Smishing is an attempt to trick a victim into [...]

What is Vishing?2017-04-18T15:24:38-05:00

A Look at Phishing: Part 2 Spear Phishing

2017-04-18T15:26:09-05:00

In part 2 of our look at Phishing, we focus on a targeted form that often effects senior leadership in an organization: Spear Phishing. Spear phishing is the targeted effort to trick a small group of employees into letting hackers gain access. Spear phishing efforts often involve one of the familiar tactics of tricking [...]

A Look at Phishing: Part 2 Spear Phishing2017-04-18T15:26:09-05:00

A Look at Phishing: Part 1

2017-04-18T15:26:18-05:00

The term "phishing" can be traced back to the 1970's, when a group of hackers known as "phreaks" would experiment with ways to get in and out of network systems. The earliest phreakers began with telephone systems and mimicked tones to get unauthorized calls to connect. Once they could trick the system into letting [...]

A Look at Phishing: Part 12017-04-18T15:26:18-05:00

Energy industry software and security

2017-04-18T15:26:35-05:00

In the wake of the terrorist attacks in France on 13 November, 2015, much attention has been given to how terrorist networks communicate securely over Internet connections. This online activity has led many to look deeper at online behavior. Likewise, illegal activity has led many to look deeper vulnerable networks of industrial systems. In [...]

Energy industry software and security2017-04-18T15:26:35-05:00

Understanding Botnets

2017-04-18T15:26:43-05:00

This post, we take a look at Botnets: what they are, how they work, and how they are shaping the foundations for future software security efforts. A botnet is a collaboration of many computers working together to accomplish a task. On the face, this seems harmless enough. When one considers that most botnets are [...]

Understanding Botnets2017-04-18T15:26:43-05:00

Hollywood Presbyterian Medical Center

2017-04-18T15:27:00-05:00

The Hollywood Presbyterian Medical Center (HPMC) in Los Angeles, California was affected by a malware attack on 05 February. What followed was a series of misquoted ransom demands, conflicting response messages, and jumbled reports of the sequence of events. By 15 February, the hospital reported that they had restored services and were back in [...]

Hollywood Presbyterian Medical Center2017-04-18T15:27:00-05:00
Go to Top