Blog Stats
- 75,850 hits
Monthly Archives: September 2015
Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading
Posted in Security Blog
Tagged 2015, APT, command and control, phishing, satellite, social engineering, Turla, watering hole
Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers
Mars Rover Susceptible to Integer Overflow Vulnerability
The Mars Rover has parts that run on VxWorks, and with that, bring some vulnerabilities. The Integer Overflow vulnerability was in the OS which allows targeting a specific part of the operating system and write to memory on the machine running. … Continue reading
Posted in Security Blog
Tagged Integer Overflow Vulnerability, Mars Rover, vulnerability, VxWorks
Comments Off on Mars Rover Susceptible to Integer Overflow Vulnerability
Vehicle Automation Susceptible to DoS Attacks
Self driving cars are pretty darn cool, but so are cybersecurity attacks against them. Like stopping them in their tracks with a laser pointer. No kidding! Security researcher, Dr. Jonathan Petit, (English version of little john… lol) points out the … Continue reading
Posted in Security Blog
Tagged 2015, car hacking, cyber risk, driverless cars, hacking, jonathan petit, lidar
Comments Off on Vehicle Automation Susceptible to DoS Attacks
1st Half of 2015’s Data Breaches – Infographic
Here are some awesomely shocking numbers related to data breaches of 2015s 1st half of the year. Get the report here.
Posted in Security Blog
Tagged 2015, breaches, data breaches, gemalto, infographic
Comments Off on 1st Half of 2015’s Data Breaches – Infographic
Infographic on Ethical Hacking
Found on Trustwave‘s site.
Posted in Security Blog
Tagged ethics, hacking, infographic, lol, Security Awareness
Comments Off on Infographic on Ethical Hacking
You Won’t Believe What Makes This Beautiful Pattern Underwater!!!
The image in the title was created by the pufferfish, but more importantly, this is how some people try to get you to click on links. It’s called Click-Baiting. A cool picture, maybe some cool information you might not know, … Continue reading
Posted in Security Blog
Tagged click-bait, phishing, Security Awareness
Comments Off on You Won’t Believe What Makes This Beautiful Pattern Underwater!!!
Here’s Why Physical Security Walkthroughs Are a Great Test
If you act like you belong, it’s not often you get questioned about your actions. This has been proven time and time again at many places with a lot of turnaround. This has especially worked well for a recent Walmart … Continue reading
Posted in Security Blog
Tagged 2015, fraud, Physical Security, Security Awareness, social engineering
Comments Off on Here’s Why Physical Security Walkthroughs Are a Great Test
Security Awareness Training Evolution
The lesson here, is that you shouldn’t make security awareness training; dull, boring, and strictly compliance based. Keep it: Fun Fresh Measurable
Posted in Security Blog
Tagged 2015, phishing, Security Awareness
Comments Off on Security Awareness Training Evolution
New Android Ransomware from the NSA?
There is new ransomware floating around that encrypts the contents of Android phones called Simlocker. It pretends to be from the NSA, uses XMPP (Extensible Messaging and Presence Protocol) and is hard to detect with anti-malware tools. Check Point’s malware … Continue reading
Posted in Security Blog
Tagged android, Google Android, NSA, ransomware
Comments Off on New Android Ransomware from the NSA?