Because of Ebay, Your Other Accounts Could Be Compromised!.

As I read through the news on the Ebay breach, I got to thinking,  it’s not just the Ebay account informationEbay you have to worry about, rather ANY other account that matches.

For instance you can log into Ebay with either your email address, or userID. Now let’s say you are using the same email address and password for PayPal, Amazon, Facebook, YouTube, WordPress, Twitter, or some other fairly popular public site.

Since the hackers stole your information from Ebay, they could simply troll through other sites on the web with your login information, and see if the door opens.

Change All Your Passwords!You do not need to be a brain surgeon to put two and two together.  So after you change your Ebay account password, do the same for your other accounts.

Written by: Francesco Trama, CEO, PacketViper


Today I woke and found this alert in my email:

ON WORLD Press Freedom Day, Saturday May 3, Panama’s TVN channel 2 received another “cyber-attack” on its website ( The network said that the attacks have gone on continuously for five days leading up to Sunday’s election and a TVN broadcaster has been threatened via Twitter. read” 

Network Security Driving Me NutsMy opinion is this: There needs to be a point when “we” as security professionals take responsibility to clearly explain to customers the 10, 20, and 100K security systems they have purchased or being sold to them have a disclaimer.

Disclaimer: This security device will get you 80% secure at best, with hard work, and commitment; This device will need constant attention, managing, and there’s a good possibility if you  forget, or ignore something on it your network and all its data will be compromised! 

I’m sure it might say something in twenty paragraphs of the EULA.

There are many factors on why I say this, and some that come to mind are: complexity, learning curve, commitment to product, lack of firewall and security knowledge, management, and false sense of security after the sale.

Look at network #security like this: Just because you purchased a $50,000.00 car loaded with heated seats, self adjusting signal mirrors, night vision, auto sensing collision control, mustache trimmer (that was a joke), and self parking doesn’t mean it will protect you in an accident. The accident will still happen, but the severity “could” be lessened because of the driver.

Some key things you need to understand as the “purchasee” , is;

  • If  training courses are offered on the firewall,  there will huge management commitment. Training is always good though. (read next point)
  • Remember, it took several years, and scores of very smart technologist building those expensive  firewalls. Don’t expect simplicity.
  • What if you took that 50K firewall, enabled every single feature it offers, and threw a load on it? Performance, latency?  Most likely,

Forget the “set it, and forget it”, there is no such thing! Your company is committing in the expense, so you must commit to the technology. Most of our customers realized the firewalls they already have are pretty good once they placed our product in front.  Why you ask? Because they are not seeing the chaos at the gateway anymore.

Some things are meant to stand by themselves to do the job right, and the one who tries to do it all will be forced to compromise quality. – Francesco Trama -

Also….putting the same complex product platform into cheaper hardware, then restricting features DOES NOT mean the customer will understand your product any better! One other thing, doe’s stripping features away to make a product “affordable, with  base protection” a good idea? Having a base protection, is like having nothing at all,. To me it screams “You won’t have “this”problem” or “Don’t worry about!”.  Last I looked small business is the achilles heel of network security Ask the floral shop or doctors office  to manage what ever version of <insert firewall name here>.

PacketViper Home Screen

Quickly filter and block any country, network, or IP with a click from our actionable real time logs.

At #PacketViper  we started with a simple solution, and kept it simple, Possibly why we are so effective.  People always ask us how do we compare with ” <name here> “, and we always say ” How does <name here> compare with #PacketViper?”. We are extremely effective in what we do, and how we do it. I would go as far as saying “We make the customers existing security systems look good”.

When we tell customers you can simply filter, block, alert, and discover traffic information of any company, region, or country “with a click”; We mean what we say.  You may hear us say  “LOW COST, PRACTICAL SOLUTION”.  That is the truth in what we do.

By: Francesco Trama: Chief Executive Officer and Co-Founder: PacketViper, LLC

I could not agree more with this Huffington Post blogger.  Small business is the soft under belly of network security and everyone needs to wake up.  Think about it, small business have just as valuable data as the large organization, and their security is weaker.  So it makes them an obvious target to siphon data from.

Its a two front problem.  these smaller businesses contain valuable customer information the attackers salivate over, and should these less secure businesses have secure connections,  username and password to a larger organization, then its a twofer for the attacker. More disturbing is these side doors may not be discovered for 3-6, months,  an estimate many security firms are showing, so its a pretty serious problem.

It’s not necessarily their fault though. The cost for security can be very expensive, which forces them to purchase out of the box solutions that sometimes gives them a false sense of security,  not mentioning their security talent may not be there.

By Francesco Trama


“Smaller targets can mean big rewards for cyber criminals
Small and medium-sized businesses are equally susceptible to attacks from hackers as are large entities and even government agencies. According to the National Cyber Security Alliance, an astonishing one in five small businesses falls victim to cyber crime each year. Even more frightening: According to an August 2013 story in PCWorld, of those small businesses whose systems are breached, roughly 60 percent go out of business within six months after the attack.”

Since the UN Identified this back in February, do you think the infections have spread, or have been curtailed? I would say with near certainty they have grown exponentially like a plague in every direction uncontrollably.  Here in the US we are finding it difficult to manage our own break outs, even though at times we can slow the growth. Now imagine the “up and coming” tech areas to our south, still getting their “%^&*” together.

By no means am I saying “we” (US) has theirs together, I just consider us further along is all.

Given they are still in their “tech growing phase” these or any under developed tech areas should be considered high risk, and treated with higher scrutiny and limited how your networks are exposed to these areas.

By Francesco Trama


Explainer: Cybercrime in Latin America

” Illegal botnets, or networks of remote-controlled computers infected with malware, have been found throughout Latin America. Also known as “zombie computers,” these networks can be used for a variety of cybercrimes, ranging from stealing personal information to sending spam. Trustnet’s study found that nearly half of all global cybercrime takes place through remote access with methods like botnets.

Cybercriminals from anywhere in the world can control the botnets through command and control servers, or C&Cs. A February 2013 UN draft report identified significant clusters of C&Cs in the Caribbean basin, as well as Central America. Two types of malware spawned zombie computers in the region last year—one called Dorkbot that infected 80,000 computers in 10 Latin American countries, the other called the Flashback virus, which harmed 40,000 Latin American computers.”


I got this alert today that one of our local media outlets got hit with a possible DDoS.  Just a few miles from them sits PacketViper, LLC, and PacketViper, something which would have shutdown the attacking countries at their port without the need of an global outage.

By Francesco Trama

Surge in web requests temporarily shuts down Trib Total Media website

By Tribune-Review

Published: Friday, Oct. 11, 2013, 11:48 a.m.

A large volume of Internet traffic overwhelmed Trib Total Media websites Friday, preventing users from accessing them. The incident started about 9 a.m. and lasted for about three hours, causing the Trib’s websites to become unavailable or run slowly. The Trib reported the event to the FBI as a precaution.

Read more:
Follow us: @triblive on Twitter | triblive on Facebook

Luckily this is not an issue with our customers, all they have to do is limit their access. I would image most of our US customers have already limited this access.

By Francesco Trama,2817,2425836,00.asp

Cyber attacks are on the rise, but where are they originating from? If you guessed China, you’re close, but most of the attack traffic during the quarter actually originated in Indonesia, according to a new report from Akamai.

In the second quarter, Akamai found that attacks originated in 175 countries, with Indonesia accounting for 38 percent of those attacks – up from 21 percent in the first quarter. China came in at No. 2 with 33 percent, down 1 percent this quarter. The U.S. stayed at No. 3, but dropped from 8.3 percent to 6.9 percent.