Blog Stats
- 75,850 hits
Monthly Archives: February 2014
Hacker Drones Hacking Drones
I love Hak5.org and their proof of concepts with real world practicality. It’s all fun and games and you get to peer into the hacker mind, where the combining of separate technologies can be turned from prank to cybercrime and … Continue reading
Posted in Security Blog
Tagged 2014, arp poisoning, dns poison, drones, hak5, packet sniffing, phishing, quadcopter, security, video tutorial, wifi
Comments Off on Hacker Drones Hacking Drones
Happy Valentine’s Day & Be Cautious
Posted in Security Blog
Tagged 2014, awareness, information security, malware
Comments Off on Happy Valentine’s Day & Be Cautious
Six Failures of Target’s Non-Compliance
Ira Winkler, is very well known champion in the security arena who is super busy and he still found time to write this article on ComputerWorld in regards to the 6 Failures of Target. To summarize the article, basically, there … Continue reading
Posted in Security Blog
Tagged 2014, computer security, hacked, Ira Winkler, network security, PCI Compliance, target, target breach
Comments Off on Six Failures of Target’s Non-Compliance
400Gbps DDoS using NTP
Amplification attacks using NTP are on the rise. The UDP-based protocol can use a small request and cause a heavy payload response. CloudFlare has done an outstanding job explaining how the following picture is possible. Read about it here on … Continue reading
Posted in Security Blog
Tagged 2014, Amplification Attack, cloudflare, DDoS, ntp, udp
Comments Off on 400Gbps DDoS using NTP
Verizon’s 2014 PCI Compliance Report
The Verizon PCI Compliance Report is available here (good if you DON’T have Adobe Reader) or from it’s original location here (good if you DO have Adobe Reader). The Verizon 2014 PCI Compliance Report uses data and insights drawn directly … Continue reading
Posted in Security Blog
Tagged 2014, PCI Compliance, verizon
Comments Off on Verizon’s 2014 PCI Compliance Report
Old and Tech Saavy
Do you know anything about QR code safety? If you don’t know what the QR code is for, don’t scan it! This may seem like a fun prank to try on your friends or whatnot, but how easy would it … Continue reading
SQLmap for Auto SQL Injection
Ultimate Peter demonstrates how easy it is to find a vulnerable to SQL injection website and uses SQLmap to quickly find the users and passwords. Remember, it is against the law to perform this type of testing on systems you … Continue reading
Posted in Security Blog
Tagged 2014, kali, sql injection, sqlmap, video tutorial
Comments Off on SQLmap for Auto SQL Injection
Albert Gonzalez
It’s hard not to be a little envious of the amazing technical skills and charismatic charm of Albert Gonzalez. Then again, I’m glad I haven’t done anything as crazy and super happy to not be serving a 20 year sentence. … Continue reading
Posted in Security Blog
Tagged 2014, Albert Gonzalez, computer security, cybercrime, Dave & Busters, hacked, hacking, Heartland Payment, information security, Rolling Stone, security, TJ Maxx, U.S. Secret Service
Comments Off on Albert Gonzalez
Pat and Courtney Announce
Of course we knew back in December, but we weren’t allowed to say anything until Pat and Courtney were ready. We did a real good job keeping it under wraps. Here is Pat and Courtney’s Christmas present to the family … Continue reading
Posted in life
Comments Off on Pat and Courtney Announce
Targeting Compliance
As many of you may have heard, Target has had their customer databases compromised. From several sources, such as Krebs on Security and Information Week. The blame falls on Target relying on an external company who remotely manages the HVAC … Continue reading
Posted in Security Blog
Tagged 2014, compliance, cybercrime, hacked, PCI Compliance, target, target breach
Comments Off on Targeting Compliance