Monthly Archives: March 2015

Fake Error Message, SSL Cert Invalid

Bad guys are putting up fake error messages with hopes that victims will call them for help. Don’t fall for it!

Posted in Security Blog | Tagged , , , , | Comments Off on Fake Error Message, SSL Cert Invalid

Smartphone Enabled ATMs

BMO Harris Bank is launching the U.S.’s biggest cardless ATM network that allows  customers to withdraw cash within seconds, using nothing but their smartphones! If your phone is lost or stolen, the bank can remotely remove the app. No card … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Smartphone Enabled ATMs

Viviana’s 1st Birthday

Carmelo’s first cousin twice removed, Viviana, had her birthday! Here are some pictures of the Dr. Seuss themed birthday.

Posted in life | Comments Off on Viviana’s 1st Birthday

Free Apple Watch, Click Here!

A scam is being played out right now since Apple has re-introduced the Apple Watch. A group of scammers are creating Facebook events, littered with Apple Watch pictures, where the victim is instructed to invite 100 friends to join the … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Free Apple Watch, Click Here!

Spear Phishing in Florida Nearly Leads to Half Million Dollar Loss

Orange Park City Hall nearly lost $500,000 from the city’s bank account at Wells Fargo, according to Security Info Watch. An email with an attachment was sent to an employee. Once the attachment was opened, similar emails were sent to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Spear Phishing in Florida Nearly Leads to Half Million Dollar Loss

Bloomberg Interview with FBI Special Agent of Cyber Special Operations, Leo Taddeo

The Cost of Security Breaches

Posted in Security Blog | Tagged , , , , | Comments Off on Bloomberg Interview with FBI Special Agent of Cyber Special Operations, Leo Taddeo

Would You Buy Your Kids A “Hello Barbie” Doll?

Most kids like to talk to their toys, it’s not uncommon. As far back as I can remember, like many children, I’d play with toys and do voices for them, or ask them questions on behalf of other toys, playing out … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Would You Buy Your Kids A “Hello Barbie” Doll?

A USB to Destroy a Computer

A blog writer named Dark Purple wrote an article on a proof of concept called USB Killer, a USB that when plugged into a computer, would charge, then discharge back into the computer, to fry circuits and burn half the computer … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on A USB to Destroy a Computer

Rowhammer

Intel-compatible PCs running Linux are exploitable through the physical weaknesses in certain varieties of DDR DRAM (double data rate dynamic random-access memory) chips and gaining higher kernel privileges on the system. Google’s Project Zero has released an in-depth article on … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Rowhammer

The Disgruntled and Passed Over

The FBI reports that; Michael Meneses, a system manager and software programmer who was often passed over for promotions, created a program to pharm employee passwords, left his job at an unnamed Long Island High-Voltage Power Manufacturer, in January 2012. After … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on The Disgruntled and Passed Over