Monthly Archives: April 2015

ISIS Hackers or Incompetent Password Management?

11 television stations went off the air; websites and social media were defaced; and an internal IT outage for TV5 in Paris, France. The websites were taken over with pro-messages of the CyberCaliphate, the same group who either DDoS’ed or defaced … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on ISIS Hackers or Incompetent Password Management?

Hangin’ with Efren

Efren and Melissa were in town to pick some things up, so of course we went out to dinner! It was nice hanging with my Marine brother for a spell.

Posted in life | Comments Off on Hangin’ with Efren

China’s Internet Cannon!?

The Internet Cannon that China is touting is a technology most hackers have been using since 2010. LOIC, or the Low Orbiting Ion Cannon, is a DDoS tool. It was originally just a stress testing tool, then was converted to … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on China’s Internet Cannon!?

AT&T Data Breach = $25 Million Dollar Fine

AT&T data breaches exposed about 280,000 U.S. customers’ names and full or partial Social Security numbers. The breaches occurred at call centers used by AT&T in Mexico, Colombia, and the Philippines when employees accessed sensitive customer data without adequate authorization. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on AT&T Data Breach = $25 Million Dollar Fine

No Awareness? $683,000 is the Average Loss

Organizations that do not have security awareness programs – particularly, training for new employees – report significantly higher average financial losses from cybersecurity incidents. Companies without security training for new hires reported average annual financial losses of $683,000, while those … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on No Awareness? $683,000 is the Average Loss

Cyber Kidnapping

Of course, while dramatized for prime time audiences, the CSI: Cyber series, starting with episode 1 does have great information that is all too real. The show is available online right now here. I first wrote about baby monitors getting … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Cyber Kidnapping

Edward Snowden & John Oliver On Passwords

This is what it’s like explaining password complexity to normal people.

Posted in Security Blog | Tagged , , , , | Comments Off on Edward Snowden & John Oliver On Passwords

Carmelo and Sebastiano

I believe I found my father and my half-brother who is named after his grandfather, Sebastian.

Posted in life | Comments Off on Carmelo and Sebastiano

President Obama has made CyberSecurity a Priority

Five Things to Know: The Administration’s Priorities on Cybersecurity Protecting the country’s critical infrastructure — our most important information systems — from cyber threats. Improving our ability to identify and report cyber incidents so that we can respond in a … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on President Obama has made CyberSecurity a Priority

Ring! Ring! Yes, This is the I.R.S! NOT!

Criminals have been calling taxpayers and insisting they must “immediately give up their personal information or make a payment,” Don’t fall for it! It’s a scam! The I.R.S. will never call as their method is to send old fashioned mail. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Ring! Ring! Yes, This is the I.R.S! NOT!