Search Results for: social engineering

20 Bucks Buys You 1,000 Node Bot Army

According to the Dell SecureWorks report, for $20 you can purchase a small bot army of 1,000 computers. Findings in the deep web also include that the there is excellent customer service! Master those basics people and you will gain … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 20 Bucks Buys You 1,000 Node Bot Army

Goodwill/C&K Systems

Back when I posted about the 868,000 Payment Cards, 330 Stores, it was recently revealed that the exposure was due to C&K Systems. All 20 previously affected Goodwill members have stopped using C&K Systems to process customers’ payment cards… Earlier … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Goodwill/C&K Systems

The Best Defense

The best defense a company can have against cyber and social engineering attacks is have educated people. People who know how to manage systems, people who know how to be cautious, people who know when they need to escalate and … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on The Best Defense

Get Comfortable: @SecureNinjaTV Free Training

Going through my twitter feed, I enjoyed an embedded secureninjatv video and then decided to check out their youtube page. I’ve embedded it for your convenience. There are about 22 videos in the playlist embedded above. Get comfortable, take frequent … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , , , , , | Comments Off on Get Comfortable: @SecureNinjaTV Free Training

What’s the Risk?

When asked, what’s the risk? I find great pleasure in flexing my ability to break down potential loss in either qualitative or quantitative methods. The FAIR Quantitative Risk Model was taught to me by Jack Jones, the creator. I also … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on What’s the Risk?

8. Exam Essentials for Malicious Code and Application Attacks

Understand the propagation techniques used by viruses. File Inflection, service injection, boot sector infection, macro infection. Most antivirus programs use signature-based detection algorithms to look for telltale patterns of known viruses. It’s essential to update virus definition files in order … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 8. Exam Essentials for Malicious Code and Application Attacks

4. Exam Essentials for Secure Communications and Network Attacks

Remote access security management requires that security system designers address the hardware and software components of an implementation along with issues related to policy, work tasks, and encryption. Protocols & mechanisms that may be used on LANS and WANS are: … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 4. Exam Essentials for Secure Communications and Network Attacks

2. Exam Essentials for Access Control Attacks and Monitoring

Understand basic risk elements Risk is the likelihood that a threat can exploit a vulnerability and cause damage to assets. Asset valuation identifies the value of assets Threat modeling identifies threats against these assets Vulnerability analysis identifies weaknesses in an … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on 2. Exam Essentials for Access Control Attacks and Monitoring

Top 20 Critical Security Controls

You know, I really dig SANS for putting things together. On their page called Critical Security Controls for Effective Cyber Defense, they list the top 20 critical security controls. I’m actually amazed at how quite a few companies do not … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Top 20 Critical Security Controls