January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,945 hits
Tag Archives: 2014
My Google GPS Footprint
I was in Hawaii on vacation from the 4th of July to the 17th. If you have an Android phone with GPS on, you can access your location history. Now of course, like most technology, this can be really cool, … Continue reading
Posted in Security Blog
Tagged 2-step, 2014, android, footprint, Google location history, gps, Information Technology Security Awareness, passwords, Security Awareness, two-factor
Comments Off on My Google GPS Footprint
What is CyberRisk?
The definition of cyber risk is an exposure to the chance of injury or loss by means of computerized attack. Here is a great article about the six trends of Cyber Risk for 2014.
Posted in Security Blog
Tagged 2014, cyber risk, cyberrisk, definition
Comments Off on What is CyberRisk?
Lights, Camera, Hacktion
A vulnerability was found by some white-hat hackers who researched how to obtain the wifi passwords of homes that had super cool lights that could be turned on, off, or dimmed by an app on a phone (both IOS and … Continue reading
Posted in Security Blog
Tagged 2014, camera, hacked, Information Technology Security Awareness, Internet of Things, lights, passwords, Security Awareness, wifi
Comments Off on Lights, Camera, Hacktion
The Study of a Thousand Breaches
According to this study, “Despite everything you’re read about cyber security, despite all the breaches in the news, the fact is well-intentioned business people are still surprisingly behind the times.” Hackers aren’t the only ones to blame when a breach … Continue reading
Posted in Security Blog
Tagged 2014, basel categories, events, likelihood, threats
Comments Off on The Study of a Thousand Breaches
Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?
Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without … Continue reading
Posted in Security Blog
Tagged 2014, Lorrie Faith Cranor, passwords, ted, ted talks, Tedx CMU
Comments Off on Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?
Ted Talks: Chris Domas: The 1s and 0s behind cyber warfare
Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, “cyber.” In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of … Continue reading
Posted in Security Blog
Tagged 2014, cyber warfare, ted, ted talks
Comments Off on Ted Talks: Chris Domas: The 1s and 0s behind cyber warfare
The Norse Hacking Map
At this link, you can watch the world hacking map, hosted by Norse. Apparently back in 2012, the United States was getting attacked at least 10,000,000 times a day. Can you imagine what it is now? 20 million? 40 million? … Continue reading
Posted in Security Blog
Tagged 2014, DDoS, dos, hacking, map, Security Awareness
Comments Off on The Norse Hacking Map
Keren Elazari: Hackers: the Internet’s immune system
Keren gives a great talk about the Internet.
Posted in Security Blog
Tagged 2014, hackers, Keren Elazari, ted
Comments Off on Keren Elazari: Hackers: the Internet’s immune system
PRINCE2 Risk Management
22 minutes of your time and you will learn PRINCE2 Risk Management.
Posted in Security Blog
Tagged 2014, likelihood, probability, risk, risk analysis, risk author, risk category, risk management, risk response
Comments Off on PRINCE2 Risk Management
The Best Defense
The best defense a company can have against cyber and social engineering attacks is have educated people. People who know how to manage systems, people who know how to be cautious, people who know when they need to escalate and … Continue reading
Posted in Security Blog
Tagged 2014, Information Technology Security Awareness, NIST 800-50, Security Awareness
Comments Off on The Best Defense