Blog - Adaptus

Shopping carts are attractive targets because they collect payment information from customers: if your malware can tap into this data stream, you have a ready-made card collection tool.

Read More

"The system contained sensitive data, including credit card numbers, bank account information, medical information and Social Security numbers," said Quest officials in a statement. "Lab results were not provided to AMCA and were not exposed in the breach."

Read More

When we've done everything we need to do, the last thing we will do is a dumpster dive. Its miserable, but it's crazy how lucrative it is. We show up with rubber gloves and start ripping bags open. It's amazing how much confidential information ends up in the trash. 

Read More

The scammer said he needed the seller to accept an “emergency” check for larger than the sales price, and then send the overage to someone else to complete the transaction. Anyone in our field would know this was a scam, but only because we’ve seen it before.

Read More

According to the Mueller report, an FBI investigation revealed that in November 2016 the GRU “sent spear-phishing emails to over 120 email accounts used by Florida county officials responsible for administering the 2016 U.S. election” and malware embedded in Word documents in those emails enabled the GRU to gain access to “at least one Florida county government.”

Read More

As a company that suffered a data beach, UK newspaper Racing Post underwent its own rethink around security strategy, while also navigating three acquisitions that could potentially have been problematic if approached in the wrong way.

Read More

The transformative ways in which new technologies – particularly artificial intelligence – are being utilized call for deeper discussions around the ethical considerations of these deployments. Depending on the organization and its level of ambition for implementing these technologies, that might even include the need for a chief ethics officer to ensure these issues receive appropriate attention at high levels of the organization.

Read More

If you don’t collect it, no one can steal it. I’m guessing some of the people in this 200 million-record breach would agree. Sometimes the best way to secure customer data is not to collect it in the first place. While it can be tempting to “collect it all” just in case, most enterprises need […]

Read More

Researchers have found new flaws in Intel processors that could allow hackers to defeat the security boundaries enforced by virtual machine hypervisors, operating system kernels and Intel SGX enclaves, putting data on both servers and endpoint systems at risk. The new attack techniques can be used to leak sensitive secrets like passwords or encryption keys […]

Read More

First it was cloud, now it’s multi-cloud. As Australian companies ramp up their investment in as-a-service everything – Gartner predicts the annual spend will rise to $7 billion in 2021, up from $4.6 billion in 2018 – the trend of using multiple cloud computing and storage services continues to gather speed. Some of Australia’s largest […]

Read More