Blog Stats
- 75,653 hits
Monthly Archives: January 2015
Hacker’s List
A new service is online where a person posts a problem to solve as a job and another person bids on the work if they know how to solve it. So far, most problems look to be in regards to: … Continue reading
19,000 French Websites Either Defaced or DDoS’ed
Since the three day terror attack that started in France on January 7 with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers. Defacements had the message: ‘The Islamic State Stay … Continue reading
Posted in Security Blog
Tagged 2015, cyber caliphate, DDoS, Death to Charlie, Death to France, Fallaga team, Free Palestine, Middle East Cyber Army, The Islamic State Stay Inchallah
Comments Off on 19,000 French Websites Either Defaced or DDoS’ed
LinkedIn Phishing
There has been a lot of phishing emails claiming to be from LinkedIn Support, designed to fool recipients into giving up their login credentials. The email uses a lowercase I instead of a capital i when spelling ‘Linkedln’ I promote … Continue reading
Posted in Security Blog
Tagged 2 factor, 2015, linkedin, passwords, phishing, social engineering, two-factor
Comments Off on LinkedIn Phishing
20150415 = Changes to CISSP Domains
Q: How is the CISSP exam changing? A: The CISSP exam is being updated to stay relevant amidst the changes occurring in the information security field. Refreshed technical content has been added to the Official (ISC)² CISSP CBK to reflect … Continue reading
Posted in CISSP-Study
Tagged 2015, CISSP, CISSP Study Requirements
Comments Off on 20150415 = Changes to CISSP Domains
New Scam, Don’t Click Court Ordered Appearance Notification
Bad guys are sending emails claiming to come from a real law firm called ‘Baker & McKenzie’. The email states you are scheduled to appear in court and should click a link to view a copy of the court notice. … Continue reading
Posted in Security Blog
Tagged 2015, beware, court, cybercrime, malware, Security Awareness, summons
Comments Off on New Scam, Don’t Click Court Ordered Appearance Notification
Vulnerability Found in Certain AMD Processor
A vulnerability was found in AMD Processors that insufficiently protected code signatures and other errors in the firmware could be used by hackers to inject software, which could then be executed by the System Management Unit and Accelerated Processing Units. … Continue reading
Posted in Security Blog
Tagged 2014, 2015, AMD, video tutorial, vulnerabilty
Comments Off on Vulnerability Found in Certain AMD Processor
Presidential Proposal List
As part in the President’s State of the Union address, Barack Obama is planning on: Insisting that companies reveal data breaches within 30 days Criminalizing the sale of botnets Criminalizing the sale of stolen U.S financial data The President’s twitter feed … Continue reading
Posted in Security Blog
Tagged 2015, cybersecurity, Information Technology Security Awareness, POTUS, President, Security Awareness
Comments Off on Presidential Proposal List
Non-Oracle sites offering Oracle ‘Fixes’/Malware
Oracle put out a press release, it reads: Warning It has come to our attention that there are non-Oracle sites offering Oracle ‘fixes’ for genuine Oracle error messages. You probably already don’t need to be told, however: Please do not … Continue reading
Posted in Security Blog
Tagged 2015, malware, Oracle, phishing, SEO, social eing
Comments Off on Non-Oracle sites offering Oracle ‘Fixes’/Malware
IBM Z13 Mainframe: Fast and Promotes Secure Process
IBM unveiled its z13 mainframe, a computer system and says is the most powerful and secure ever built. When a single transaction triggers, as many as 100 others that must be run in order to analyze past purchases, data encryption … Continue reading
Posted in Security Blog
Tagged 2015, analysis, IBM Mainframe, Pre-Check, Z13
Comments Off on IBM Z13 Mainframe: Fast and Promotes Secure Process
U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate
The United States Central Command (USCENTCOM) is a theater-level Unified Combatant Command of the U.S. Department of Defense, established in 1983. It was originally conceived of as the Rapid Deployment Joint Task Force (RDJTF). Its area of responsibility includes countries … Continue reading
Posted in Security Blog
Tagged 2015, centcom, cyber caliphate, cyberterrorism, isis, Islamic State of Iraq and al-Sham, twitter, us central command, youtube
Comments Off on U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate