Blog Stats
- 75,851 hits
Monthly Archives: February 2014
Mikko Hypponen: How NSA Ruined Our Trust
Airgap, blackpearl, cineplex, xkeyscore, prism, creek, crossbones, cultweave, cybertrans, dishfire, doublearrow, dragonfly, wealthycluster, hightide, skywriter, jollyroger, kingfish, liquidfire, messiah, nightsurf, normalrun, mailorder, pinwale, taperlay, tarotcard, twistedpath, yellowstone. If you have nothing to hide, can you be trusted with secrets? How … Continue reading
Posted in Security Blog
Tagged 2014, confidentiality, Mikko Hypponen, network security, NSA, privacy, rights
Comments Off on Mikko Hypponen: How NSA Ruined Our Trust
Hackers Target HVAC to Target Target
Here is a link to Krebs On Security in regards to how Target hackers broke in via an HVAC Company. I would be weary about phishing sites that contact you to sign up for credit monitoring, they could be… A … Continue reading
Posted in Security Blog
Tagged Brian Krebs, krebs, PCI Compliance, target breach
Comments Off on Hackers Target HVAC to Target Target
Don Frieson: Forgotten Password Comedy
Some good clean comedy about passwords and websites with comedian Don Frieson.
Posted in Security Blog
Tagged 2014, comedian, Don Frieson, lol, passwords, standup
Comments Off on Don Frieson: Forgotten Password Comedy
Hack an Electronic Safe with a Potato
No seriously! Not in English. But you will get it.
Posted in Security Blog
Tagged 2014, lol, potato, safe cracking, video tutorial
Comments Off on Hack an Electronic Safe with a Potato
Arizona Renaissance Festival 2014
Ahh, the magical Renaissance Festival in Arizona. Such beauty and magic. OK, I know that it is always a hoot to see what people will wear in the hot weather for attention, and how so many people are not period … Continue reading
More James Lyne, Discussing Cybercrime
James Lyne is just brilliant.
Posted in Security Blog
Tagged 2014, cybercrime, James Lyne, ted
Comments Off on More James Lyne, Discussing Cybercrime
Cryptography Video Speaker James Lyne
The speaker is James Lyne
Posted in Security Blog
Tagged 2014, cryptography, James Lyne, prime numbers, ted, video tutorial
Comments Off on Cryptography Video Speaker James Lyne
The Value of a Hacked PC
Just to enlighten you what the value of a hacked PC is to a bad guy. From a Krebs security article
Posted in Security Blog
Tagged 2014, Brian Krebs, computer security, hacked
Comments Off on The Value of a Hacked PC
WireShark
Here is a video on using WireShark if you are new to it.
Posted in Security Blog
Tagged 2014, network security, packet capture, sniffing, ubuntu, video tutorial, wireshark
Comments Off on WireShark
(ISC)^2 Code of Ethics
Code of Ethics Canons: Protect society, the common good, necessary public trust and confidence, and the infrastructure. Act honorably, honestly, justly, responsibly, and legally. Provide diligent and competent service to principals. Advance and protect the profession. Check here to validate … Continue reading