Blog Stats
- 75,849 hits
Monthly Archives: October 2014
Social Engineering – How to Scam Your Way into Anything
A great video by Brian Brushwood, from Scam School, on Social Engineering. The video quotes the following books:
Posted in Security Blog
Tagged 2014, con, scam, social engineering, ted, video tutorial
Comments Off on Social Engineering – How to Scam Your Way into Anything
Social Engineering Fraud by Chubb Insurance
A great little video on Social Engineering fraud.
Posted in Security Blog
Tagged 2014, fraud, Information Technology Security Awareness, phishing, Security Awareness, social engineering, video
Comments Off on Social Engineering Fraud by Chubb Insurance
Killer Robot… Ebola Killer Robot That Is!
A Robot named Gigi, uses ultraviolet light 25,000 times more powerful than sunlight. It kills ebola by scrambling the genetic codes on surface areas. Pretty wicked.
Posted in Security Blog
Tagged 2014, ebola, killer robots, robot
Comments Off on Killer Robot… Ebola Killer Robot That Is!
How Tyupkin, the ATM Malware, Works
The hack, known as Tyupkin, requires criminals to enter a unique code into a machine that has already been compromised by the malware. A second Pin code – a random sequence of numbers generated at another location – is also … Continue reading
The Rise of the Hackers
Here’s a preview of the show! If you aren’t a fan of PBS|NOVA, you need to be! From http://www.pbs.org/wgbh/nova/tech/rise-of-the-hackers.html Our lives are going digital. We shop, bank, and even date online. Computers hold our treasured photographs, private emails, and all … Continue reading
Posted in Security Blog
Tagged 2014, hacker movies, hackers, movie, NOVA, PBS
Comments Off on The Rise of the Hackers
SSL 3.0 POODLE
Google security researchers have disclosed a vulnerability in SSL 3.0 that allows attackers to determine the plaintext of secure connections. Attackers can use the flaw to trigger network faults to push browsers back to the 15 year-old platform. POODLE is … Continue reading
Posted in Security Blog
Tagged 2014, Google, man-in-the-middle, mitm, openssl, Padding Oracle On Legacy Downgraded Encryption, POODLE, ssl, tls, v3, vulnerability, vulnerable websites
Comments Off on SSL 3.0 POODLE
The Perfect Dropbox Meme
If you are wondering what I’m talking about, read the article over here: https://www.carmelowalsh.com/2014/10/seven-million-dropbox-passwords/ Found on Cheezburger
SandWorm
On Tuesday, October 14, 2014, iSIGHT Partners – in close collaboration with Microsoft – announced the discovery of a zero-day vulnerability impacting all supported versions of Microsoft Windows and Windows Server 2008 and 2012. Microsoft has patched this vulnerability in … Continue reading
Posted in Security Blog
Tagged 2014, CVE-2014-4114, globsec, hacking, malware, phishing, sandworm, trousersnake
Comments Off on SandWorm
The Human Side of IT Security
Found on Dell’s website, this graphic will help you keep an eye out for common security pitfalls and learn what organizations and end users can do to minimize risks.
Posted in Security Blog
Tagged 2014, infographic, Information Technology Security Awareness, NCSAM, Security Awareness
Comments Off on The Human Side of IT Security
Seven Million Dropbox Passwords
6,937,081 usernames and passwords were unfortunately stolen from other services and used in attempts to log in to Dropbox accounts. I recommend that users turn on two-factor authentication and install a time-based, one-time password app on a mobile device. To … Continue reading
Posted in Security Blog
Tagged 2014, dropbox, hacked, information security, passwords
Comments Off on Seven Million Dropbox Passwords