Daily Archives: October 3, 2014

War Stories of the Future

Posted in Security Blog | Tagged , , , , | Comments Off on War Stories of the Future

Embed HTML Web App for Social Engineering Attack

In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Embed HTML Web App for Social Engineering Attack

Interactive VCDB

If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.

Posted in Security Blog | Tagged , , , | Comments Off on Interactive VCDB

Mac.BackDoor.iWorm

When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. Hackers are using the iWorm to control 17,000 Apple computers. The iWorm reportedly uses Reddit’s search function to find comments left by … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Mac.BackDoor.iWorm

The End-User Security Prayer

Found on Dark Reading

Posted in Security Blog | Tagged , , , | Comments Off on The End-User Security Prayer