Featured Blog

/

On June 16, 2014

What sort of personal information is there on your mobile phones? Could they pose a threat if you lose, lend or dispose them?

The Top 5 Smartphones of 2013

June's Security Awareness newsletter brought this to Omega ATC's attention and we wish to share it with our rea ...

Read More
/

On May 9, 2014

Tips to protect yourselves from Advanced Persistent threats (APT)

APT is one of the most dangerous of threats.  If they get into a system or network they establish a foothold and a base from where they latch onto other areas within the network.  Once in, the gains are long-term for the hackers. Through this type of exploit ...

Read More
/

On April 4, 2014

How to ensure continuous compliance? Here are some suggestions.

Here are some points  from an article related to establishing an IT control framework. However, this is perfectly applicable for ensuring continuous compliance in retail security as well.  Some sensible high-lev ...

Read More
/

On January 2, 2014

‘Man in the browser attack’ has latched on to Twitter

The last post explained what 'man in the browser attack means.  This is a follow-up detailing how the attack has targeted 'Twitter' accounts to make it easy to spread to enterprise networks. Here is how the malware has been working on 'Twitter' JavaScript code gets into a Twitter ...

Read More
/

On December 30, 2013

‘Man in the browser attack’, a new Malware that invades the security of financial transactions

'Man in the browser attack' at this point is limited to financial frauds, but could spread to other areas.  The attack is now being targeted only at Firefox and Internet Explorer browsers on Windows because the method used to create the attack is quite expensive. Here's how it happens... Read More

Stay up to date with the latest from Omega