January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,941 hits
Tag Archives: 2014
Snapchat, the Snappening
Snapchat pictures stolen through third party apps. More nudes online. Users of the app, many of them teenagers, have apparently had their photos gathered over a number of years before being posted on a website. The leak – dubbed the … Continue reading
Posted in Security Blog
Tagged 2014, fappening, leak, nudes, snapchat, Snappening
Comments Off on Snapchat, the Snappening
NOVA Labs – Cybersecurity Lab
I stumbled upon a little jewel yesterday when I found PBS Presents: The Secret Lives of Hackers. The video is nicely done, but what’s more is the website that the video was originally posted on. PBS, the Public Broadcasting Service, … Continue reading
Posted in Security Blog
Tagged 2014, cyber security, cybersecurity, information security, Information Technology Security Awareness, National Cyber Security Awareness Month, NCSAM, NOVA, PBS, security, Security Awareness, Security Awareness Video Games, video tutorial
Comments Off on NOVA Labs – Cybersecurity Lab
Instructables.com Defaced
I just happened to stumble upon this today. It happened 20 minutes ago from the time stamps.
Posted in Security Blog
Tagged 2014, defaced, hacked, instructables.com
Comments Off on Instructables.com Defaced
PBS Presents: The Secret Lives of Hackers
Found here
Posted in Security Blog
Tagged 2014, hackers, video tutorial
Comments Off on PBS Presents: The Secret Lives of Hackers
Sears:Kmart Breach
Today Kmart stores were hit with a data breach that compromised some shoppers’ debit and credit card information but no personal information, no debit card PIN numbers, no email addresses and no social security numbers were obtained by those criminally … Continue reading
Posted in Security Blog
Tagged 2014, breach, credit card, hacked, hackers, kmart, malware, sears
Comments Off on Sears:Kmart Breach
2 Factors of Authentication
A little hassle with logging into a system is tremendously worth the amount of security, if that system has information worth securing. I’ve enabled two-factor authentication for services I use. Some services call it two-step authentication, which is a sub-category … Continue reading
Posted in Security Blog
Tagged 2014, passwords, two-factor
Comments Off on 2 Factors of Authentication
International Dairy Queen & Orange Julius Breach
According to the Dairy Queen website, they discovered evidence that the systems of some DQ locations and one Orange Julius location were infected with the widely-reported Backoff malware that is targeting retailers across the country. The ice cream and fast … Continue reading
Posted in Security Blog
Tagged 2014, breach, credit card, Dairy Queen, hacked, hackers, Orange Julius
Comments Off on International Dairy Queen & Orange Julius Breach
FEMA Federal Emergency Management Agency on #NCSAM
Post by FEMA Federal Emergency Management Agency.
Posted in Security Blog
Tagged 2014, fema, Information Technology Security Awareness, NCSAM, Security Awareness, video tutorial
Comments Off on FEMA Federal Emergency Management Agency on #NCSAM
Chris Pirillo on National Cyber Security Awareness Month #NCSAM
This video is from 3 years ago. So some of the talk is a little dated. The NCSAM campaign is intended to help spread awareness of the importance of good Web browsing practices. Cyber security is a shared responsibility, and … Continue reading
Posted in Security Blog
Tagged 2014, Chris Pirillo, Information Technology Security Awareness, NCSAM, Security Awareness, video tutorial
Comments Off on Chris Pirillo on National Cyber Security Awareness Month #NCSAM
Bruce Schneier: Talks at Google
From the YouTube page Human society runs on trust. We all trust millions of people, organizations, and systems every day — and we do it so easily that we barely notice. But in any system of trust, there is an … Continue reading