Monthly Archives: October 2014

AZ State Fair 2014

For a fun treat, we went to the Arizona State Fair, ate some funnel cake and other fried crap, and then watched a Sublime and Rome concert. It was fun and it was also Damien’s first concert! I saw this … Continue reading

Posted in life | Comments Off on AZ State Fair 2014

Tiny Robot Bees

Posted in Security Blog | Tagged , , , | Comments Off on Tiny Robot Bees

Snapchat, the Snappening

Snapchat pictures stolen through third party apps. More nudes online. Users of the app, many of them teenagers, have apparently had their photos gathered over a number of years before being posted on a website. The leak – dubbed the … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Snapchat, the Snappening

NOVA Labs – Cybersecurity Lab

I stumbled upon a little jewel yesterday when I found PBS Presents: The Secret Lives of Hackers. The video is nicely done, but what’s more is the website that the video was originally posted on. PBS, the Public Broadcasting Service, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on NOVA Labs – Cybersecurity Lab

Instructables.com Defaced

I just happened to stumble upon this today. It happened 20 minutes ago from the time stamps.

Posted in Security Blog | Tagged , , , | Comments Off on Instructables.com Defaced

PBS Presents: The Secret Lives of Hackers

Found here

Posted in Security Blog | Tagged , , | Comments Off on PBS Presents: The Secret Lives of Hackers

Sears:Kmart Breach

Today Kmart stores were hit with a data breach that compromised some shoppers’ debit and credit card information but no personal information, no debit card PIN numbers, no email addresses and no social security numbers were obtained by those criminally … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Sears:Kmart Breach

2 Factors of Authentication

A little hassle with logging into a system is tremendously worth the amount of security, if that system has information worth securing. I’ve enabled two-factor authentication for services I use. Some services call it two-step authentication, which is a sub-category … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on 2 Factors of Authentication

International Dairy Queen & Orange Julius Breach

According to the Dairy Queen website, they discovered evidence that the systems of some DQ locations and one Orange Julius location were infected with the widely-reported Backoff malware that is targeting retailers across the country. The ice cream and fast … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on International Dairy Queen & Orange Julius Breach

FEMA Federal Emergency Management Agency on #NCSAM

Post by FEMA Federal Emergency Management Agency.

Posted in Security Blog | Tagged , , , , , | Comments Off on FEMA Federal Emergency Management Agency on #NCSAM