Wednesday, July 23, 2014

Stalking Prey: An RF Hackers Perspective

Stalking Prey: An RF Hacker's Perspective
by Signals Defense Chief Security Officer Rick Mellendick




 

Nearly everyone has an RF signature, and it is becoming as common as your fingerprint. This signature is the culmination of device and device usage ....








              .....an attacker can use your RF signature to track you and attack


Read more on page 51; http://www.uscybersecurity.net/Pages/current_online_magazine.html





FTCs Authority to Investigate Data - Breach Case _ 2014 Report: Data-Breaches & Records Exposed

Wall Street Journal: Judge Backs FTCs Authority in Data-Breach Case - Wyndham:  http://online.wsj.com/news/articles/SB10001424052702304819004579487832665956494

Identity Theft Resource Center Reports on 2014 Data-Breaches and Records Exposed:
http://www.idtheftcenter.org/images/breach/ITRCBreachStatsReportSummary2014.pdf
 
 
 
 

Thursday, July 17, 2014

Why Companies need to be Proactive when it comes to their security posture

FTC can sue companies over data breaches says a US court

 
 

Defcon 101 - Signals Defense CSO Rick Mellendick Presenting