Blog Stats
- 75,561 hits
Monthly Archives: January 2015
Stupidest Movie Hacks
Dorkly had this posted, it’s worth a good chuckle!
BMW Vulnerable to Remote Unlock
Update your BMW’s internal software and your smartphone app as soon as possible, the patch should deploy automatically by January 31st, but there is a chance your vehicle didn’t get the patch if you parked underground. The affected version of … Continue reading
Posted in Security Blog
Tagged BMW, car hacking, Mini Cooper, Rolls Royce, Unlock
Comments Off on BMW Vulnerable to Remote Unlock
Spear Phishing
Cyber thieves stole nearly $215 million from businesses in the last 14 months using email scams. Once a high level exec has his or her email compromised, the bad guys lurk, learn the schedules, learn the business, learn the business … Continue reading
Posted in Security Blog
Tagged 2014, 2015, Brian Krebs, cybercrime, email, hackers, phishing, Security Awareness, spoof
Comments Off on Spear Phishing
Data Privacy Day: 2015
Every January 28th, is Data Privacy Day. A good reminder to police yourself and clean up your digital footprint you left on the Internet. The 2nd Annual Report on How Personal Technology is Changing Our Lives, reports that Privacy is … Continue reading
Posted in Security Blog
Tagged 2015, digital privacy day, doxed, doxing, privacy, Security Awareness
Comments Off on Data Privacy Day: 2015
DOE Grants $25 Million for Cybersecurity Education
The Department of Energy announced it will provide $25 million in funding over the next five years to support cybersecurity education at more than a dozen Historically Black Colleges and Universities. As highlighted by the President earlier a couple weeks … Continue reading
Posted in Security Blog
Tagged 2015, Continuing Professional Education, cybersecurity, education and awareness
Comments Off on DOE Grants $25 Million for Cybersecurity Education
Doxing
Here are some doxing tutorials.
Under 11 Minutes to Crack WiFi for 7 Year Old
Seven-year-old Betsy Davis, using only youtube videos for knowledge, was able to find out how to hack the controlled environment’s public WiFi. She set up a rogue access point for a Man-in-the-Middle (MitM) attack, which allowed her to steal data … Continue reading
Posted in Security Blog
Tagged 2015, 7 year old, Betsy Davis, hackers, hacking, kid hacker, man-in-the-middle, wifi
Comments Off on Under 11 Minutes to Crack WiFi for 7 Year Old
Cisco’s 2015 Security Report
Cisco said Java represented a whopping 91 percent of all indicators of compromise, the best way to combat it? With some good old fashioned Security Awareness. Cisco’s 2015 annual security report, was released last week. As part of its report, … Continue reading
Posted in Security Blog
Tagged 2015, Cisco Security Report, malvertising, Security Awareness
Comments Off on Cisco’s 2015 Security Report
Ghost to the Shell
During a code audit, researchers at Qualys discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc which can get access to the shell. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to … Continue reading
Posted in Security Blog
Tagged 2015, gethost, GHOST, Linux, qualys, vulnerability
Comments Off on Ghost to the Shell
Game of Hacks
Test your application hacking skills! You will be presented with vulnerable pieces of code and you must find which vulnerability exists in that code as quickly as possible. You can also submit questions.
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, Malicious Code and Application Attacks, Secure Coding, Security Awareness Video Games, Software Development Security
Comments Off on Game of Hacks