Tag Archives: 2014

My Google GPS Footprint

I was in Hawaii on vacation from the 4th of July to the 17th. If you have an Android phone with GPS on, you can access your location history. Now of course, like most technology, this can be really cool, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on My Google GPS Footprint

What is CyberRisk?

The definition of cyber risk is an exposure to the chance of injury or loss by means of computerized attack. Here is a great article about the six trends of Cyber Risk for 2014.

Posted in Security Blog | Tagged , , , | Comments Off on What is CyberRisk?

Lights, Camera, Hacktion

A vulnerability was found by some white-hat hackers who researched how to obtain the wifi passwords of homes that had super cool lights that could be turned on, off, or dimmed by an app on a phone (both IOS and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Lights, Camera, Hacktion

The Study of a Thousand Breaches

According to this study, “Despite everything you’re read about cyber security, despite all the breaches in the news, the fact is well-intentioned business people are still surprisingly behind the times.” Hackers aren’t the only ones to blame when a breach … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Study of a Thousand Breaches

Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

Ted Talks: Chris Domas: The 1s and 0s behind cyber warfare

Chris Domas is a cybersecurity researcher, operating on what’s become a new front of war, “cyber.” In this engaging talk, he shows how researchers use pattern recognition and reverse engineering (and pull a few all-nighters) to understand a chunk of … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Ted Talks: Chris Domas: The 1s and 0s behind cyber warfare

The Norse Hacking Map

At this link, you can watch the world hacking map, hosted by Norse. Apparently back in 2012, the United States was getting attacked at least 10,000,000 times a day. Can you imagine what it is now? 20 million? 40 million? … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on The Norse Hacking Map

Keren Elazari: Hackers: the Internet’s immune system

Keren gives a great talk about the Internet.

Posted in Security Blog | Tagged , , , | Comments Off on Keren Elazari: Hackers: the Internet’s immune system

PRINCE2 Risk Management

22 minutes of your time and you will learn PRINCE2 Risk Management.

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on PRINCE2 Risk Management

The Best Defense

The best defense a company can have against cyber and social engineering attacks is have educated people. People who know how to manage systems, people who know how to be cautious, people who know when they need to escalate and … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on The Best Defense