Blog Stats
- 75,653 hits
Monthly Archives: January 2015
HealthCare.gov Includes Health Data in its own URLs
The website, Healthcare.gov leaks data via referer (mispelled accidentally, but stuck) headers. When you visit a website in general, the referer codes tells the new loading site, where you came from. Since healthcare.gov stores information in the referer headers, It’s … Continue reading
Posted in Security Blog
Tagged 2015, cyber, cyberprofiling, healthcare.gov, leaks, profiling, referer, referrer
Comments Off on HealthCare.gov Includes Health Data in its own URLs
Is that a Mouse in your Pocket or?
You ready to bring unauthorized hardware on my ‘secure’ network? Mouse-box, the computer in a mouse, is still in prototype. All we know right now is that it is running ChromeOS or Linux. Maybe a variant of Kali will work too. … Continue reading
4.5 Malware Variants a Second
According to German Independent IT Security company AV-TEST, there are 12,000,000 variants of malware a month. That’s about 4.5 every second! Malware, a combination of the words Malicious and Software, can be downloaded or sent to users to click on … Continue reading
Posted in Security Blog
Tagged 2015, antivirus, malware, security, Security Awareness, viruses
Comments Off on 4.5 Malware Variants a Second
Want Someone’s Password? Just Ask!
Posted in Security Blog
Tagged 2015, passwords, Security Awareness
Comments Off on Want Someone’s Password? Just Ask!
XKCD Comic on Password Strength and Random Words
Use the Four Random English Word Generator!
Posted in Security Blog
Tagged 2014, 2015, passwords, Security Awareness, xkcd
Comments Off on XKCD Comic on Password Strength and Random Words
Worst Passwords of 2014
An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading
Posted in Security Blog
Tagged 2014, 2015, authentication, Information Technology Security Awareness, passwords, reputational security, two-factor
Comments Off on Worst Passwords of 2014
Progressive Insurance’s Snapshot Can be Used to Control Vehicles
2,000,000 vehicles already have the Progressive Snapshot plugged into them via the OnBoardDiagnostic(OBD)-II Port. Digital Bond Labs described at a security conference last week how the Snapshot could be used to hack into some vehicles’ onboard networks. Testing was limited … Continue reading
Posted in Security Blog
Tagged 2015, car hacking, Flo, mitm, Progressive Insurance, Snapshot, zombie
Comments Off on Progressive Insurance’s Snapshot Can be Used to Control Vehicles
770,000 Records From One of Australia’s Largest Travel Insurance Companies
Around the number of 770,000 records of personal information consisting of travel insurance clients, names, phone numbers, email addresses, travel dates and prices for policies was stolen around December 18th. Aussie Travel Cover notified 3rd party agents, but did not … Continue reading
Posted in Security Blog
Tagged 2014, 2015, breach, Google Dorking, hacked, hackers, owasp, privacy, sql injection
Comments Off on 770,000 Records From One of Australia’s Largest Travel Insurance Companies
Beware Used or Discount Devices
Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading
Posted in Security Blog
Tagged 2015, badusb, buyer beware, hacked, hardware, keyboard, keylogger, malwre, mouse, peripherals, Security Awareness, spy, trojan, usb
Comments Off on Beware Used or Discount Devices