Tag Archives: 2014

Be a CISSP!

Avoid this frustration Be a C. I. Double S. P. To be honest, since I passed my exam in January, I feel I’ve been even more a respected member at work. The bolded ones below are the ones I’ve studied … Continue reading

Posted in CISSP-Study | Tagged , , | Comments Off on Be a CISSP!

#ICYMI CyberSecurity News Last Week

Here are some big things in the news that happened last week. In case you missed it (ICYMI). National CyberSecurity Awareness Month 17 ATMs were hacked, but no customer information was stolen Hacker Group AnonSec hacked a drone JPMorgan Chase … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on #ICYMI CyberSecurity News Last Week

BadUSB MalWare Tutorial

Here is an intro to BadUSB BadUSB can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. BadUSB resides in the firmware … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on BadUSB MalWare Tutorial

War Stories of the Future

Posted in Security Blog | Tagged , , , , | Comments Off on War Stories of the Future

Embed HTML Web App for Social Engineering Attack

In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Embed HTML Web App for Social Engineering Attack

Interactive VCDB

If you are new to the VCDB (Vocabulary for Event Recording and Incident Sharing Community Database), you are in for a treat. It’s a nice interface to gather information on incidents.

Posted in Security Blog | Tagged , , , | Comments Off on Interactive VCDB

Mac.BackDoor.iWorm

When a Mac is infected with Mac.BackDoor.iWorm, the program tries to make a connection to a command server. Hackers are using the iWorm to control 17,000 Apple computers. The iWorm reportedly uses Reddit’s search function to find comments left by … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Mac.BackDoor.iWorm

The End-User Security Prayer

Found on Dark Reading

Posted in Security Blog | Tagged , , , | Comments Off on The End-User Security Prayer

JPMorgan Chase Data Breach Affects 76M Households, 7M Small Businesses

Post by ABC15 Arizona. JPMorgan Chase said that names, addresses, phone numbers and email addresses were stolen from the company’s servers, but only customers who use the websites Chase.com and JPMorganOnline and the apps ChaseMobile and JPMorgan Mobile were affected. … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on JPMorgan Chase Data Breach Affects 76M Households, 7M Small Businesses

AnonSec Hacked Drone

Post by Anonymous. Drones remain one of President Obama’s preferred technologies in America’s war on terror, as well as a rapidly growing tool for the film industry, local police, and companies like DHL and Google.

Posted in Security Blog | Tagged , , , , , | Comments Off on AnonSec Hacked Drone