Tag Archives: 2014

1st Duqu. Next came Stuxnet. Now Regin.

An “extremely complex” and “stealthy” Stuxnet Equivalent spying program has been stealing data from ISPs, energy companies, airlines and research-and-development labs. Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage. … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 1st Duqu. Next came Stuxnet. Now Regin.

Need a New Password? Try Passweird

Passweird is a fun and interesting way to generate a password that meets most regulatory compliance password requirements. In other news, Cyber thieves have started targeting the password managers, like KeePass.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Need a New Password? Try Passweird

#FeministHackerBarbie

If you haven’t seen #FeministHackerBarbie, you must! #FeministHackerBarbie is great! — Carmelo Walsh, CISSP (@CaRMCyberSec) November 22, 2014

Posted in Security Blog | Tagged , , | Comments Off on #FeministHackerBarbie

Chinese Made eCigarette USB Malware Phones Home

It was found that some Chinese made eCigarettes and their USB charging cables, have been made with malware built right in. When plugged into a computer, it phoned home. Is this a true story or a hoax? Hard to tell … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Chinese Made eCigarette USB Malware Phones Home

Google Infographic on Account Hijackers

They have a great article here for more information.

Posted in Security Blog | Tagged , , , , | Comments Off on Google Infographic on Account Hijackers

Google Firing Range

Google Firing Range is an automated Web Application Security Scanner. Version 0.42, which was released Tuesday checks for Address DOM XSS Redirect XSS Reflected XSS Tag based XSS Escaped XSS Remote inclusion XSS DOM XSS CORS related vulnerabilities Flash Injection … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Google Firing Range

Payment Card Industry – Data Security Standard version 3.0

I’ve been doing some extensive studying for the PCI DSS v 3 and there is a vast improvement on the requirements. There are 6 goals of PCI Remove sensitive authentication data and limit data retention. This milestone targets a key … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Payment Card Industry – Data Security Standard version 3.0

CryptoWall and Dickson County Sheriff’s Office

Sheriff’s department of The Dickson County, Tennessee was attacked by a Ransomware trojan ware that encrypts all of the files on the system and can be decrypted only (HA, yeah right!) if the ransom has been paid for them to … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on CryptoWall and Dickson County Sheriff’s Office

Visual Studio Community 2013 Is Free

Start coding the app of your dreams for Windows, Android, and iOS. http://www.visualstudio.com/products/visual-studio-community-vs Pair that up with Microsoft Virtual Academy, for free coding lessons. Here is the official blog post on giving Visual Studio away.

Posted in Security Blog | Tagged , , , , | Comments Off on Visual Studio Community 2013 Is Free

The Raspberry Pi: Impact on Hacking

So, this video is a little old, but very relevant. Sure the Raspberry Pi has been available for some time now, but has the awareness about them spread out of IT and into the minds of the business leaders? Are … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on The Raspberry Pi: Impact on Hacking