Tag Archives: 2014

US Navy Laser Weapon System

The Afloat Forward Staging Base (Interim) USS Ponce (ASB(I) 15) conducts an operational demonstration of the Office of Naval Research (ONR)-sponsored Laser Weapon System (LaWS) while deployed to the Arabian Gulf. The LaWS consists of a 30-kilowatt solid-state infrared laser, … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on US Navy Laser Weapon System

POODLE attack through TLS

POODLE = Padding Oracle On Downgraded Legacy Encryption Once upon a time, in October, I wrote about SSL POODLE, a flaw in how browsers handle encryption; by negotiating down to SSL 3.0, attackers can alter padding data at the end … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on POODLE attack through TLS

Smartwatch to Smartphone Data Interception

Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Smartwatch to Smartphone Data Interception

Robocops is Now

Robotics firm Knightscope has announced its plans to deploy autonomous guards for hire in Silicon Valley. You can rent some too, starting as low as $6.25/hour with at least a year contract on a MaaS (Machine-as-a-Service) rental basis. The robots … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Robocops is Now

3 Ways on How I Stay Current On Cyber Security News

I’m often told ‘late breaking news’ by others in my profession about a breach or hack and it is sometimes something that I’ve already known about and read, and probably even already posted on my website! I have my resources and … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on 3 Ways on How I Stay Current On Cyber Security News

Mad Rambo is Mad… At the Sony Pictures Hack!

Sony pictures was breached and several movies were leaked. Movies like Fury, Annie, etc, have been found on torrent download sites. It’s believed to be tied to North Korea and a Sony movie making fun of, and the assassination of, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Mad Rambo is Mad… At the Sony Pictures Hack!

Hey Bebe!

According to an article written by Brian Krebs, it sounds like Bebe is undergoing a credit/debit breach investigation. The data copied from the magnetic stripe on the backs of credit cards, which bad-guys can use to write to blank cards … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Hey Bebe!

There is no CyberSecurity?

60 Minutes has a video on cyberthieves stealing your credit card information. This is a must watch for everybody who has a debit/credit card; a must watch for every merchant and service provider. The 15 minute video talks of the … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on There is no CyberSecurity?

PCI ISA

A couple of weeks ago, I took the training and test. I just got news yesterday. Yaay, Go me! I’ll get my PCIP as well, because, why not? Now onto my next certification.

Posted in Security Blog | Tagged , , , | Comments Off on PCI ISA

Cyber Monday is Tomorrow, Please be Cyber Secure

Be sure to stop and think about where you are when you are out and about, don’t use public wifi hotspots. It’s cyber hunting time and your data is the target and it is very easy for malicious evil doers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Cyber Monday is Tomorrow, Please be Cyber Secure