Blog Stats
- 75,561 hits
Monthly Archives: April 2015
Seven Deadly Employee Sins – How Companies Get Compromised
The average person thinks that companies get hacked by super hackers with amazing knowledge on computer systems and can break encryption by staring at jumbled code like John Forbes Nash Jr. in the movie, A Beautiful Mind. It may be … Continue reading
Posted in Security Blog
Tagged 2015, hackers, Security Awareness
Comments Off on Seven Deadly Employee Sins – How Companies Get Compromised
General David Petraeus
General David Petraeus was sentenced to serve two years on probation and to pay an $100,000 fine on Thursday for sharing classified information with his biographer and lover, Paula Broadwell. Petraeus pled guilty to one federal charge for giving 5-by-8 … Continue reading
Posted in Security Blog
Tagged General David Petraeus, Paula Broadwell, Sharing Classified Information
Comments Off on General David Petraeus
Data Breach Bills to Protect Consumers from Hackers and CyberCriminals
Last Tuesday, two new bipartisan senate bills was proposed to increase notification and create/enhance information sharing by Senators Mark Kirk (R) and Kirsten Gillibrand (D) where introduced to congress. The following is what was transcribed. By Mr. KIRK (for himself … Continue reading
Posted in Security Blog
Tagged 2015, Data Breach Notification and Punishing CyberCriminals Act, Information Sharing Credit Act, Kirsten Gillibrand (D-N.Y.), Mark Kirk (R-Ill.), Senate Bill, U.S. Senators
Comments Off on Data Breach Bills to Protect Consumers from Hackers and CyberCriminals
The World’s Most Famous Hacker: Kevin Mitnick
I got to meet Kevin at RSA and I got a signed copy of his book, with his business card, which is also a set of lock picks. Mitnick served five years in prison—four-and-a-half years’ pre-trial and eight months in solitary … Continue reading
Posted in Security Blog, Work
Tagged 2015, Carmelo, Kevin Mitnick, Meeting Hackers, rsa, World's Most Famous Hacker
Comments Off on The World’s Most Famous Hacker: Kevin Mitnick
RSA Conference 2015
I just got back from the RSA Conference at the Moscone center this week with a full pass. It’s my first time and this place is unbelievably packed! The moscone center is huge! The after parties are the places to be, … Continue reading
Posted in Security Blog
Tagged Brian Krebs, Bruce Schneier, Kevin Mitnick, Moscone Center, RSA Conference, San Francisco
Comments Off on RSA Conference 2015
Bill & Ted’s Deep Web Explained
Written by Alex Winters (Bill S. Preston, Esquire) and Narrated by Keanu Reeves (‘Ted’ Theodore Logan) as a trailer for Deep Web, The Movie, the following trailer goes deeper into the movie, but how far down the rabbit hole will … Continue reading
Posted in Security Blog
Tagged Alex Winters, Bill and Ted, deep web, dread pirate roberts, Keanu Reeves, silk, silk road, video documentary
Comments Off on Bill & Ted’s Deep Web Explained
Social Engineering Fraud Videos
Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading
Posted in Security Blog
Tagged Chubb, Derbycon, Jamison Scheeres, Security Awareness, social engineering, video tutorial
Comments Off on Social Engineering Fraud Videos
Five Habits to be Unhackable
By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading
Posted in Security Blog
Tagged 2015, information security, Information Technology Security Awareness, privacy, Security Awareness
Comments Off on Five Habits to be Unhackable
Single and Vulnerable… By the Millions
Visitors and members of Match.com are vulnerable to plaintext sniffing from a man-in-the-middle attack. Their https, redirects to http then logins are passed in the clear. Completely readable to those on the same network. Read more here.
Posted in Security Blog
Tagged 2015, man-in-the-middle, mitm, passwords, privacy
Comments Off on Single and Vulnerable… By the Millions
Jackpot! Of Sorts…
The information security director, Mr.Eddie Raymond Tipton, from a Multi-State lottery Association in Iowa, decided that it was his turn to win the United States jackpot. He has been arrested and is being tried for forgery and hacking the lottery … Continue reading
Posted in Security Blog
Tagged computer security, cybercrime, lottery, malware
Comments Off on Jackpot! Of Sorts…