Hacks & Hackers

Opinion: Anomaly Detection is no Silver Bullet for Incident Response

In-brief: detecting anomalous behavior is a necessary part of incident response – but it’s also harder than it sounds, argues Alan Hall of BlueCoat Systems in this commentary.

Sign Up with the Usual Suspects: Consumer Breach Response is Broken and How to Fix It | Digital Guardian

In-brief:The scourge of data breaches and identity theft is more than a decade old. But our tools for dealing with these common incidents are outdated and ineffective. Why? (Editor’s note: this blog post has been cross posted from Digital Guardian’s blog, where you can read it in its entirety.) 

12 Years Later: Common Configuration Flaw + Internet of Things = Massive Attacks

In-brief: A common configuration flaw may be behind a massive network of IoT devices used in “credential stuffing” attacks, according to the security firm Akamai.

Breaches Without Borders: New Data Protection Laws Cast A Wide Net

In-brief: Like it or not, U.S. companies will be expected to comply with strict new European breach notification laws. The good news: responding to breaches in this new regulatory environment just takes a little preparation, says Michael Bruemmer of Experian. 

Security Firm Warns on Flaw in Insulin Pump with No Easy Fix

In brief: A flaw in a wearable insulin pump sold by Johnson & Johnson has the potential to allow a malicious actor to force the device to administer doses of insulin to a patient without their knowledge.