VIDEO – Hacking Our Critical Infrastructure: Espionage and Cyberwar

By: February 18, 2015

On Tuesday, HackSurfer hosted a Google Hangout with Adam Meyer and Bit9 + Carbon Black’s Chief Technology Officer, Harry Sverdlove. The discussion topic was “Hacking Our Critical Infrastructure: Espionage and Cyberwar.” Check out the video below to view the session in… Read More

It’s Time to Get Security Wise about Our ‘Smart’ Cars

By: February 17, 2015

According to a recent report from Sen. Edward J. Markey (D-Mass.), serious gaps in security and customer privacy affect nearly every vehicle that uses wireless technology. The report, “Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk,”… Read More

In a Sea of APT “Icebergs,” Are You Thinking Big Enough?

By: February 13, 2015

In today’s post, I’m going to expand on an information security metaphor I introduced last week: the “sinking ship.” What might a sinking ship teach us about threats and security best practices? What sinks ships? Saboteurs? Nope, too cloak and… Read More

CTO Corner: Creation of CTIIC Demonstrates Heightened Importance of Cyber Security

By: February 11, 2015

The U.S. government is establishing a new federal agency tasked with correlating threat intelligence information and providing analysis of cyber-security risks. The new agency, known as the Cyber Threat Intelligence Integration Center (CTIIC), was officially announced Tuesday. The CTIIC will… Read More

Point-of-Sale Security for Dummies: 14 Ways to Better Protect POS Systems

By: February 11, 2015

  (Today, in part two of our Point-of-Sale Security for Dummies blog series, we take a look at the different ways to protect POS systems from advanced attacks. In part one, we addressed the current state of POS security. Stay tuned each… Read More

Demo: Hunting the Sony Wiper Malware, ‘Destover,’ Using Carbon Black


There has been a lot of coverage about the malware known as Destover. Several hashes have been released by US-CERT, the FBI and other organizations. This blog examines how you can look for this malware and its indicators of compromise… Read More