Blog Stats
- 75,849 hits
Daily Archives: January 27, 2015
DOE Grants $25 Million for Cybersecurity Education
The Department of Energy announced it will provide $25 million in funding over the next five years to support cybersecurity education at more than a dozen Historically Black Colleges and Universities. As highlighted by the President earlier a couple weeks … Continue reading
Posted in Security Blog
Tagged 2015, Continuing Professional Education, cybersecurity, education and awareness
Comments Off on DOE Grants $25 Million for Cybersecurity Education
Doxing
Here are some doxing tutorials.
Under 11 Minutes to Crack WiFi for 7 Year Old
Seven-year-old Betsy Davis, using only youtube videos for knowledge, was able to find out how to hack the controlled environment’s public WiFi. She set up a rogue access point for a Man-in-the-Middle (MitM) attack, which allowed her to steal data … Continue reading
Posted in Security Blog
Tagged 2015, 7 year old, Betsy Davis, hackers, hacking, kid hacker, man-in-the-middle, wifi
Comments Off on Under 11 Minutes to Crack WiFi for 7 Year Old
Cisco’s 2015 Security Report
Cisco said Java represented a whopping 91 percent of all indicators of compromise, the best way to combat it? With some good old fashioned Security Awareness. Cisco’s 2015 annual security report, was released last week. As part of its report, … Continue reading
Posted in Security Blog
Tagged 2015, Cisco Security Report, malvertising, Security Awareness
Comments Off on Cisco’s 2015 Security Report
Ghost to the Shell
During a code audit, researchers at Qualys discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc which can get access to the shell. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to … Continue reading
Posted in Security Blog
Tagged 2015, gethost, GHOST, Linux, qualys, vulnerability
Comments Off on Ghost to the Shell
Game of Hacks
Test your application hacking skills! You will be presented with vulnerable pieces of code and you must find which vulnerability exists in that code as quickly as possible. You can also submit questions.
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, Malicious Code and Application Attacks, Secure Coding, Security Awareness Video Games, Software Development Security
Comments Off on Game of Hacks