Blog Stats
- 75,653 hits
Monthly Archives: May 2015
Starbucks Customers Targeted
Starbucks customers have been targeted and money is being syphoned from the credit or debit card they have tied to their Starbucks accounts… Why would you even do this? No idea. But when you go for convenience, you usually sacrifice … Continue reading
Posted in Security Blog
Tagged 2015, credit card, customers, debit card, fraud, payment card, Starbucks
Comments Off on Starbucks Customers Targeted
Virtual Environment Neglected Operations Manipulation: VENOM
“Virtual Environment Neglected Operations Manipulation” or Venom, is a new vulnerability that could allow a hacker to infiltrate potentially every machine on a data center’s network, leaving millions of virtual machines vulnerable to attack, if they run QEMU… Venom can … Continue reading
Posted in Security Blog
Tagged CVE-2015-3456, QEMU, VENOM, Virtual Environment Neglected Operations Manipulation
Comments Off on Virtual Environment Neglected Operations Manipulation: VENOM
Microsoft Patching
Historically, updates to fix security are called patches because back in the day when we used punch cards to program stuff, if we did something wrong, we would affix paper patches over the holes in the punch cards. True story! … Continue reading
Posted in Security Blog
Tagged Microsoft, patch Tuesday, patching
Comments Off on Microsoft Patching
Wells Fargo Credit Cards
In order to meet tough sales quotas and unrealistic goals, credit accounts are (allegedly) being opened by Wells Fargo employees, according to the civil complaint filed by the Los Angeles City Attorney. The fraud complaint charges state that in order … Continue reading
Posted in Security Blog
Tagged 2015, credit card, PCI Compliance, pressure, Wells Fargo
Comments Off on Wells Fargo Credit Cards
USBKill Switch Engaged
USBKill is a kill-switch that waits for a change on your USB ports (such as removing the usb) and then immediately shuts down your computer and is available on GitHub. USBKill should be paired with full disk encryption for maximum … Continue reading
Password Complexity Vs. Length
As you can see, after adding several characters, it takes a password cracker seconds to millions of millennia to crack a password.
May the Fourth: Star Wars Day
This has always bothered me.
Posted in Security Blog
Tagged lol, May 4th, passwords, Star Wars Day
Comments Off on May the Fourth: Star Wars Day
World War II Encryption
Visit TheDarkLand
Schools Hacked
The University of California Berkeley school was hit with a data breach that might have exposed students’ Social Security numbers. The data held in the breached computer included Names, Social Security, and bank account numbers. The breach affected about 260 … Continue reading
Hard Rock Hotel & Casino
If you visited a restaurant, bar, or retail outlet at a Hard Rock Hotel or Casino between September 3rd, 2014 and April 2nd, 2015 in Las Vegas, and don’t have credit monitoring set up, please check your statements and/or sign … Continue reading
Posted in Security Blog
Tagged 2015, breach, credit card, hacked, hard rock cafe, hotel, restaurant, retailers
Comments Off on Hard Rock Hotel & Casino