Oy.
On Mon, Dec 30, 2013 at 1:17 PM, J- P <[email protected]> wrote: > fingerprint, retina scans- its not like were not being monitored already, > may as well use some of that "big brother" technology for the people > instead of against us [image: Emoji] > > > > > > > > > > > > Jean-Paul Natola > > > > ------------------------------ > From: [email protected] > > To: [email protected] > Subject: RE: [NTSysADM] RE: 40 Million CC breach at Target.... > Date: Mon, 30 Dec 2013 15:03:02 +0000 > > > Chip and Pin technology was broken in Europe in 2012. Not really sure > what we can at this point. > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Harry Mavromatidis > *Sent:* Monday, December 30, 2013 10:00 AM > *To:* [email protected] > *Subject:* RE: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > Using Chip + Pin on cards to prevent duplicating the cards: > http://en.wikipedia.org/wiki/Chip_and_PIN > > > > *From:* [email protected] [ > mailto:[email protected] <[email protected]>] *On > Behalf Of *Andrew S. Baker > *Sent:* Sunday, December 29, 2013 12:18 AM > *To:* ntsysadm > *Subject:* Re: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > Canada and the rest of the world have done what? > > > > > > > > *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker> > *Providing Virtual CIO Services (IT Operations & Information Security) for > the SMB market…* > > > > > > On Wed, Dec 25, 2013 at 11:57 AM, Bourque Daniel < > [email protected]> wrote: > > Canada and the rest of the world have done it. At some point, when > customers will be tired to pay for all the frauds (you pay for it, not the > credit card companies), something will have to move... > > Daniel Bourque > > > > *De *: Maglinger, Paul [mailto:[email protected]] > *Envoyé *: Wednesday, December 25, 2013 08:41 AM > *À *: '[email protected]' <[email protected]> > *Objet *: RE: [NTSysADM] RE: 40 Million CC breach at Target.... > > > Wal-mart is big enough that they might get away with it. I seem to recall > that Visa and Walmart got into a spat over fees and basically Walmart said > they wouldn’t take the cards. Visa backed down. > > > > The article did make a valid point – converting the card readers would be > very expensive. > > > > -Paul > > > > > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Ken Schaefer > *Sent:* Wednesday, December 25, 2013 3:48 AM > *To:* [email protected] > *Subject:* RE: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > Chipping is something that a bank needs to do – not something Target can > enforce – unless one wants to mount the argument that Target should decline > all business from customers that have non-chip cards. That seems like a > recipe for corporate suicide, and doesn’t take into account online > transactions. > > > > Cheers > > Ken > > > > *From:* [email protected] [ > mailto:[email protected] <[email protected]>] *On > Behalf Of *Jon Harris > *Sent:* Wednesday, 25 December 2013 2:07 AM > *To:* [email protected] > *Subject:* RE: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > I believe in the case of Target that cloning was thought to be what the > attackers wanted to do or at least that was what appeared to be the target > of their intrusion. I believe the one of the articles I read indicated > that all the information to clone was what was taken. Chipping has been a > long standing argument both pro and con by those in the financial industry > here in the states for a couple of years I believe. As Micheal has said > (at one point) many companies here in the states do the minimum they have > to until they have their ass bit by an attacker. Unlike from my very > short reading of news articles they don't face the same penalties that many > companies do outside the country for lax security. > > Personally in an ideal world hackers once identified would be tried and > executed by a very painful method by a third party (one with no axe to > grind something similar to what the Hague is supposed to do but only for > criminals). > > Jon > > ------------------------------ > > From: [email protected] > To: [email protected] > Subject: RE: [NTSysADM] RE: 40 Million CC breach at Target.... > Date: Tue, 24 Dec 2013 08:40:16 +0000 > > All credit cards have magnetic strips for backwards compatibility reasons > (all of my CCs have chips – I have a dozen issued across three countries, > and they all have both), but don’t chips merely prevent cloning? It doesn’t > stop someone using them at a “card not present” sale (e.g. an online store). > > > > Is it going to be adequate security; or is it going to be financially > feasible security? > > > > All security is risk management. You can avoid, accept, transfer or > mitigate a risk – and which you choose comes down to a set of factors, > including cost. > > > > What’s the difference between “adequate security” and “financially > feasible security”? I’ve never heard this distinction between drawn before. > > > > Cheers > > Ken > > > > *From:* [email protected] [ > mailto:[email protected] <[email protected]>] *On > Behalf Of *Micheal Espinola Jr > *Sent:* Tuesday, 24 December 2013 2:42 PM > *To:* [email protected] > *Subject:* Re: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > Re-read the information about the Target breach, and reconsider what I > have said. This would not effect people outside of the US that do not use > credit cards with magnetic strips. > > Its not just a matter of reading the strip directly, but as well as the > technology involved in how that information is further processed. > > Ken, please pick a point are you going to choose to argue against/for: Is > it going to be adequate security; or is it going to be financially feasible > security? > > > -- > Espi > > > > > > On Mon, Dec 23, 2013 at 7:27 PM, Ken Schaefer <[email protected]> wrote: > > How do you know “they should not have happened”? Perfect security is, > pretty much, impossible. So, statistically, there will always be some level > of breaches occurring, including some level of severe breaches. How do you > know we aren’t at a level that makes monetary sense? Would you be prepared > to, say, halve your income (because prices are double), simply to have 5% > or 10% fewer security breaches? > > > > I don’t see how any recent serious breach is related to the use of > magnetic stripe media or re-use of stolen phones, so I don’t really > understand what you’re saying there. > > > > Cheers > > ken > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *Micheal Espinola Jr > *Sent:* Tuesday, 24 December 2013 2:20 PM > *To:* [email protected] > > > *Subject:* Re: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > I can only assume they dont, since historically (generally speaking) there > have had serious breaches that should not have happened. I've been > involved with POS systems, banking systems, as well as various wifi-devices > - and for years, there's been a lot of foolishness. Business rarely does > what it should - and instead only does what it has to, or can financially > bet against. > > - Banking: We (the US) still allow a system that relies heavily on > magnetic strip media. > - Telco: We (the US) still allow a system were cell phones can be > stolen and reused. > > > -- > Espi > > > > > > On Mon, Dec 23, 2013 at 6:31 PM, Ken Schaefer <[email protected]> wrote: > > Your rant presupposes that there isn’t “decent security” already in > place. What evidence do you have that there isn’t? > > > > Cheers > > Ken > > > > *From:* [email protected] [mailto: > [email protected]] *On Behalf Of *J- P > *Sent:* Tuesday, 24 December 2013 12:43 PM > *To:* [email protected] > *Subject:* RE: [NTSysADM] RE: 40 Million CC breach at Target.... > > > > /rant on > > I have one question that rings in the back of my mind, they (banks > creditors merchants etc..) charge all sorts of fee's, > sometimes i'have heard of fees larger than a bill thats due- > Why cant they take a piece of that to get some decent security into place? > > /rant off > > Happy holidays and a prosperous new year to all > > > > > > > > > > > Jean-Paul Natola > > ------------------------------ > > From: [email protected] > > > Date: Mon, 23 Dec 2013 08:10:19 -0500 > > Subject: Re: [NTSysADM] RE: 40 Million CC breach at Target.... > > To: [email protected] > > *>>**That's a pretty fair analogy - and both statements are true. On the* > > > > > > > *other hand, banking is much better understood - experience with banking > goes back hundreds of years, with concomitant expertise in many fields in > dealing with the risks in banking. The experience around computing is much > more shallow, and the risks are not as well known, nor has nearly as much > thought and practice gone into mitigating them.* > > > > > Okay, so how about when banking relies upon computing? Which risk profile > comes into play, then -- the hundreds of years, or the shallow > years/decades? > > Whether or not YOU use online banking, it is almost assured that your bank > provides it and that others are aware of its existence. Do you think that > your bank is providing such a service without any reliance upon 3rd > parties? Do you think that because you aren't using the online services > from your bank that your data would be unimpacted? > > (Hint: I'm sure that some of the people impacted in the Target breach, as > in the TJX breach before it, were *not* online users) > > > > > *ASB **http://XeeMe.com/AndrewBaker* <http://xeeme.com/AndrewBaker> > *Providing Virtual CIO Services (IT Operations & Information Security) for > the SMB market…* > > > > > > > > On Sun, Dec 22, 2013 at 10:31 PM, Kurt Buff <[email protected]> wrote: > > On Sun, Dec 22, 2013 at 6:59 PM, Andrew S. Baker <[email protected]> > wrote: > >>>Amazon's cloud is external to its customers - Amazon's staff, > > procedures and infrastructure are a risk to its customers. > > > > > That's as illogical a statement as the following: > > > XYZ Bank's technology infrastructure is external to its customers - XYZ > > Bank's staff, procedures and infrastructure are a risk to its > customers... > > That's a pretty fair analogy - and both statements are true. On the > other hand, banking is much better understood - experience with > banking goes back hundreds of years, with concomitant expertise in > many fields in dealing with the risks in banking. The experience > around computing is much more shallow, and the risks are not as well > known, nor has nearly as much thought and practice gone into > mitigating them. > > > >>>Except when suborned or perverted by money, patriotism or blackmail: > > > http://www.reuters.com/article/2013/12/20/us-usa-security-rsa-idUSBRE9BJ1C220131220 > > > > > And how does you maintaining your infrastructure on-premises, but having > to > > rely on 3rd party telecommunications mitigate the above risk in any way? > > It's not just that specific incident - that's but one example, and in > this specific instance, there was no remedy - trusted parties were > subverted, and the same can happen in other fields. I'm not arguing > for perfection here - just a recognition that complexity brings risk, > and that keeping things simple and under more control is usually wise. > > Indeed, for some businesses, especially small ones with no IT staff, > or very limited IT staff, going with a public cloud might make sense. > But if a business has good IT staff, I'd venture that migrating most > or all of their infrastructure to a public cloud isn't their best bet. > > Kurt > > > > > > > Mise en garde concernant la confidentialité : Le présent message, > comprenant tout fichier qui y est joint, est envoyé à l’intention exclusive > de son destinataire; il est de nature confidentielle et peut constituer une > information protégée par le secret professionnel. Si vous n’êtes pas le > destinataire, nous vous avisons que toute impression, copie, distribution > ou autre utilisation de ce message est strictement interdite. Si vous avez > reçu ce courriel par erreur, veuillez en aviser immédiatement l’expéditeur > par retour de courriel et supprimer le courriel. Merci! > Confidentiality Warning: This message, including any attachment, is sent > only for the use of the intended recipient; it is confidential and may > constitute privileged information. If you are not the intended recipient, > you are hereby notified that any printing, copying, distribution or other > use of this message is strictly prohibited. If you have received this email > in error, please notify the sender immediately by return email, and delete > it. Thank you! > > > This e-mail and any files transmitted with it are property of Indiana > Members Credit Union, are confidential, and are intended solely for the use > of the individual or entity to whom this e-mail is addressed. If you are > not one of the named recipient(s) or otherwise have reason to believe that > you have received this message in error, please notify the sender and > delete this message immediately from your computer. Any other use, > retention, dissemination, forwarding, printing, or copying of this email is > strictly prohibited. > > Please consider the environment before printing this email. >

