Monthly Archives: October 2014

Chris Pirillo on National Cyber Security Awareness Month #NCSAM

This video is from 3 years ago. So some of the talk is a little dated. The NCSAM campaign is intended to help spread awareness of the importance of good Web browsing practices. Cyber security is a shared responsibility, and … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Chris Pirillo on National Cyber Security Awareness Month #NCSAM

Bruce Schneier: Talks at Google

From the YouTube page Human society runs on trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an … Continue reading

Posted in Security Blog | Tagged , | Comments Off on Bruce Schneier: Talks at Google

Be a CISSP!

Avoid this frustration Be a C. I. Double S. P. To be honest, since I passed my exam in January, I feel I’ve been even more a respected member at work. The bolded ones below are the ones I’ve studied … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on Be a CISSP!

#ICYMI CyberSecurity News Last Week

Here are some big things in the news that happened last week. In case you missed it (ICYMI). National CyberSecurity Awareness Month 17 ATMs were hacked, but no customer information was stolen Hacker Group AnonSec hacked a drone JPMorgan Chase … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on #ICYMI CyberSecurity News Last Week

BadUSB MalWare Tutorial

Here is an intro to BadUSB BadUSB can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. BadUSB resides in the firmware … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on BadUSB MalWare Tutorial

War Stories of the Future

Posted in Security Blog | Tagged , , , , | Comments Off on War Stories of the Future

Embed HTML Web App for Social Engineering Attack

In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Embed HTML Web App for Social Engineering Attack

Interactive VCDB

If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.

Posted in Security Blog | Tagged , , , | Comments Off on Interactive VCDB

Mac.BackDoor.iWorm

When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. Hackers are using the iWorm to control 17,000 Apple computers. The iWorm reportedly uses Reddit’s search function to find comments left by … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Mac.BackDoor.iWorm

The End-User Security Prayer

Found on Dark Reading

Posted in Security Blog | Tagged , , , | Comments Off on The End-User Security Prayer