Blog Stats
- 75,563 hits
Monthly Archives: January 2015
Blackhat Behind the Scenes Movie Trailer
Back in September, I wrote about Thor being a black hat hacker. Here is the behind the scenes extended trailer. The trailer seems pretty good with some research on the back end. I hope the actual movie is good! Post … Continue reading
Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee
This was in the news yesterday, it is proof that social engineering is the master key to unlock many locks. It is also proof that to keep your lock secured, security awareness and training is needed with the end goal … Continue reading
Posted in Security Blog
Tagged 2015, Fox News, Information Technology Security Awareness, John McAfee, passwords, phishing, Security Awareness, social engineering, sony, spoof, spoofing, Stuart Varney
Comments Off on Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee
The Raven
An adaptation of Edgar Allen Poe’s famous poem of the Raven. Once upon a midnight dreary, while I pondered weak and weary, Over many a quaint and curious volume of forgotten security lore. While I nodded, nearly napping, suddenly there … Continue reading
Posted in Security Blog
Tagged 2015, Edgar Allan Bro, Security Awareness, The Raven
Comments Off on The Raven
OpenSSL: 8 Bugs Fixed
First off, I’d like to explain what OpenSSL is! OpenSSL refers to the name of a 1998 project that was started to encrypt websites and user information across the Web. The “SSL” in “OpenSSL” refers to a Secure Sockets Layer … Continue reading
Posted in Security Blog
Tagged 2015, certificates, encryption, openssl, secure websites, ssl
Comments Off on OpenSSL: 8 Bugs Fixed
On June 30th at 23:59:59, Some Internet Might Crash
Earth’s rotational time has slowed by 1 second. Earth is slowing down due to earthquakes, tidal drag, and the weather, and losing approximately two thousandths of a second every day. To allow for syncing up atomic clock time with the Earth’s … Continue reading
Posted in Security Blog
Tagged 2015, atomic clock, International Earth Rotation and Reference Systems Service, leap second, ntp
Comments Off on On June 30th at 23:59:59, Some Internet Might Crash
SaveMe App is Actually SocialPath Malware for Android Phones
The Save Me app claims to be able to save a user’s contacts and other data including photos and videos, in the event that a mobile device is lost or stolen but it actually contains a variant of information-stealing malware … Continue reading
Posted in Security Blog
Tagged 2015, android, cyber risk, cybercrime, malware, Security Awareness
Comments Off on SaveMe App is Actually SocialPath Malware for Android Phones
CyberBerkut
Head of the German governmental press and information agency said in a news conference that the government websites including Chancellor Angela Merkel’s page have been attacked. The CyberBerkut pro-Russian and hacktivist organization has claimed the cyber attack. They even stated … Continue reading
Posted in Security Blog
Tagged 2015, CyberBerkut, German, germany, hacktivism
Comments Off on CyberBerkut
Is 2015 Going to be Similar to 2014 in Breaches?
On January 2nd, Chick-fil-A released a statement in regards to the security breach they found out about on December 19th, 2014. One unnamed financial institution said it received an alert that contained “nearly 9,000 customer cards” for a breach that … Continue reading
Posted in Security Blog
Tagged 2014, 2015, Bitstamp, breach, Chick-fil-A, hacked, Morgan Stanley
Comments Off on Is 2015 Going to be Similar to 2014 in Breaches?
An Intro To Recon-ng Pushpin
Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly … Continue reading
Posted in Security Blog
Tagged 2015, phishing, recon-ng, Reconnaissance, social engineering, video tutorial
Comments Off on An Intro To Recon-ng Pushpin
Protecting Personal Information
Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, passwords, Protect Your Personal Information, two-factor
Comments Off on Protecting Personal Information