January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,941 hits
Tag Archives: 2014
Be a CISSP!
Avoid this frustration Be a C. I. Double S. P. To be honest, since I passed my exam in January, I feel I’ve been even more a respected member at work. The bolded ones below are the ones I’ve studied … Continue reading
#ICYMI CyberSecurity News Last Week
Here are some big things in the news that happened last week. In case you missed it (ICYMI). National CyberSecurity Awareness Month 17 ATMs were hacked, but no customer information was stolen Hacker Group AnonSec hacked a drone JPMorgan Chase … Continue reading
Posted in Security Blog
Tagged 2014, CyberSecurity News, ICYMI
Comments Off on #ICYMI CyberSecurity News Last Week
BadUSB MalWare Tutorial
Here is an intro to BadUSB BadUSB can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. BadUSB resides in the firmware … Continue reading
Posted in Security Blog
Tagged 2014, android, badusb, firmware, impersonation, malware, Security Awareness, smartphones, tutorial, video tutorial
Comments Off on BadUSB MalWare Tutorial
War Stories of the Future
Posted in Security Blog
Tagged 2014, cyber war, cyber warfare, cyberwarfare, lol
Comments Off on War Stories of the Future
Embed HTML Web App for Social Engineering Attack
In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading
Posted in Security Blog
Tagged 2014, armitage, hacking, html, phishing, social engineering, video tutorial, web app
Comments Off on Embed HTML Web App for Social Engineering Attack
Interactive VCDB
If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.
Posted in Security Blog
Tagged 2014, information security, risk analysis, Security Awareness
Comments Off on Interactive VCDB
Mac.BackDoor.iWorm
When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. Hackers are using the iWorm to control 17,000 Apple computers. The iWorm reportedly uses Reddit’s search function to find comments left by … Continue reading
The End-User Security Prayer
Found on Dark Reading
Posted in Security Blog
Tagged 2014, lol, passwords, Security Awareness
Comments Off on The End-User Security Prayer
JPMorgan Chase Data Breach Affects 76M Households, 7M Small Businesses
Post by ABC15 Arizona. JPMorgan Chase said that names, addresses, phone numbers and email addresses were stolen from the company’s servers, but only customers who use the websites Chase.com and JPMorganOnline and the apps ChaseMobile and JPMorgan Mobile were affected. … Continue reading
Posted in Security Blog
Tagged 2014, breach, Chase, JPMorgan
Comments Off on JPMorgan Chase Data Breach Affects 76M Households, 7M Small Businesses
AnonSec Hacked Drone
Post by Anonymous. Drones remain one of President Obama’s preferred technologies in America’s war on terror, as well as a rapidly growing tool for the film industry, local police, and companies like DHL and Google.