Blog Stats
- 75,850 hits
Monthly Archives: October 2014
Chris Pirillo on National Cyber Security Awareness Month #NCSAM
This video is from 3 years ago. So some of the talk is a little dated. The NCSAM campaign is intended to help spread awareness of the importance of good Web browsing practices. Cyber security is a shared responsibility, and … Continue reading
Posted in Security Blog
Tagged 2014, Chris Pirillo, Information Technology Security Awareness, NCSAM, Security Awareness, video tutorial
Comments Off on Chris Pirillo on National Cyber Security Awareness Month #NCSAM
Bruce Schneier: Talks at Google
From the YouTube page Human society runs on trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an … Continue reading
Be a CISSP!
Avoid this frustration Be a C. I. Double S. P. To be honest, since I passed my exam in January, I feel I’ve been even more a respected member at work. The bolded ones below are the ones I’ve studied … Continue reading
#ICYMI CyberSecurity News Last Week
Here are some big things in the news that happened last week. In case you missed it (ICYMI). National CyberSecurity Awareness Month 17 ATMs were hacked, but no customer information was stolen Hacker Group AnonSec hacked a drone JPMorgan Chase … Continue reading
Posted in Security Blog
Tagged 2014, CyberSecurity News, ICYMI
Comments Off on #ICYMI CyberSecurity News Last Week
BadUSB MalWare Tutorial
Here is an intro to BadUSB BadUSB can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. BadUSB resides in the firmware … Continue reading
Posted in Security Blog
Tagged 2014, android, badusb, firmware, impersonation, malware, Security Awareness, smartphones, tutorial, video tutorial
Comments Off on BadUSB MalWare Tutorial
War Stories of the Future
Posted in Security Blog
Tagged 2014, cyber war, cyber warfare, cyberwarfare, lol
Comments Off on War Stories of the Future
Embed HTML Web App for Social Engineering Attack
In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading
Posted in Security Blog
Tagged 2014, armitage, hacking, html, phishing, social engineering, video tutorial, web app
Comments Off on Embed HTML Web App for Social Engineering Attack
Interactive VCDB
If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.
Posted in Security Blog
Tagged 2014, information security, risk analysis, Security Awareness
Comments Off on Interactive VCDB
Mac.BackDoor.iWorm
When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. Hackers are using the iWorm to control 17,000 Apple computers. The iWorm reportedly uses Reddit’s search function to find comments left by … Continue reading
The End-User Security Prayer
Found on Dark Reading
Posted in Security Blog
Tagged 2014, lol, passwords, Security Awareness
Comments Off on The End-User Security Prayer