Monthly Archives: February 2014

Mikko Hypponen: How NSA Ruined Our Trust

Airgap, blackpearl, cineplex, xkeyscore, prism, creek, crossbones, cultweave, cybertrans, dishfire, doublearrow, dragonfly, wealthycluster, hightide, skywriter, jollyroger, kingfish, liquidfire, messiah, nightsurf, normalrun, mailorder, pinwale, taperlay, tarotcard, twistedpath, yellowstone. If you have nothing to hide, can you be trusted with secrets? How … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Mikko Hypponen: How NSA Ruined Our Trust

Hackers Target HVAC to Target Target

Here is a link to Krebs On Security in regards to how Target hackers broke in via an HVAC Company. I would be weary about phishing sites that contact you to sign up for credit monitoring, they could be… A … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Hackers Target HVAC to Target Target

Don Frieson: Forgotten Password Comedy

Some good clean comedy about passwords and websites with comedian Don Frieson.

Posted in Security Blog | Tagged , , , , , | Comments Off on Don Frieson: Forgotten Password Comedy

Hack an Electronic Safe with a Potato

No seriously! Not in English. But you will get it.

Posted in Security Blog | Tagged , , , , | Comments Off on Hack an Electronic Safe with a Potato

Arizona Renaissance Festival 2014

Ahh, the magical Renaissance Festival in Arizona. Such beauty and magic. OK, I know that it is always a hoot to see what people will wear in the hot weather for attention, and how so many people are not period … Continue reading

Posted in Event | Tagged , , , , , | Comments Off on Arizona Renaissance Festival 2014

More James Lyne, Discussing Cybercrime

James Lyne is just brilliant.

Posted in Security Blog | Tagged , , , | Comments Off on More James Lyne, Discussing Cybercrime

Cryptography Video Speaker James Lyne

The speaker is James Lyne

Posted in Security Blog | Tagged , , , , , | Comments Off on Cryptography Video Speaker James Lyne

The Value of a Hacked PC

Just to enlighten you what the value of a hacked PC is to a bad guy. From a Krebs security article

Posted in Security Blog | Tagged , , , | Comments Off on The Value of a Hacked PC

WireShark

Here is a video on using WireShark if you are new to it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on WireShark

(ISC)^2 Code of Ethics

Code of Ethics Canons: Protect society, the common good, necessary public trust and confidence, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Advance and protect the profession. Check here to validate … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on (ISC)^2 Code of Ethics