December 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,851 hits
Tag Archives: 2014
1st Duqu. Next came Stuxnet. Now Regin.
An “extremely complex” and “stealthy” Stuxnet Equivalent spying program has been stealing data from ISPs, energy companies, airlines and research-and-development labs. Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage. … Continue reading
Need a New Password? Try Passweird
Passweird is a fun and interesting way to generate a password that meets most regulatory compliance password requirements. In other news, Cyber thieves have started targeting the password managers, like KeePass.
Posted in Security Blog
Tagged 2014, compliance, lol, passweird, password, password generator, password managers, passwords
Comments Off on Need a New Password? Try Passweird
Chinese Made eCigarette USB Malware Phones Home
It was found that some Chinese made eCigarettes and their USB charging cables, have been made with malware built right in. When plugged into a computer, it phoned home. Is this a true story or a hoax? Hard to tell … Continue reading
Posted in Security Blog
Tagged 2014, badusb, ecig, ecigarette, malware, usb, vape
Comments Off on Chinese Made eCigarette USB Malware Phones Home
Google Infographic on Account Hijackers
They have a great article here for more information.
Posted in Security Blog
Tagged 2014, hackers, Information Technology Security Awareness, phishing, Security Awareness
Comments Off on Google Infographic on Account Hijackers
Payment Card Industry – Data Security Standard version 3.0
I’ve been doing some extensive studying for the PCI DSS v 3 and there is a vast improvement on the requirements. There are 6 goals of PCI Remove sensitive authentication data and limit data retention. This milestone targets a key … Continue reading
Posted in Security Blog
Tagged 2014, credit card, data security standards, guidance, help, PCI Compliance, requirements, security standards council
Comments Off on Payment Card Industry – Data Security Standard version 3.0
CryptoWall and Dickson County Sheriff’s Office
Sheriff’s department of The Dickson County, Tennessee was attacked by a Ransomware trojan ware that encrypts all of the files on the system and can be decrypted only (HA, yeah right!) if the ransom has been paid for them to … Continue reading
Posted in Security Blog
Tagged 2014, cryptowall, Dickson County, encryption, malware, ransomware, Sheriff, Tennessee
Comments Off on CryptoWall and Dickson County Sheriff’s Office
Visual Studio Community 2013 Is Free
Start coding the app of your dreams for Windows, Android, and iOS. http://www.visualstudio.com/products/visual-studio-community-vs Pair that up with Microsoft Virtual Academy, for free coding lessons. Here is the official blog post on giving Visual Studio away.
Posted in Security Blog
Tagged 2014, Learn to Code, Learn to hack, Microsoft, Visual Studio
Comments Off on Visual Studio Community 2013 Is Free
The Raspberry Pi: Impact on Hacking
So, this video is a little old, but very relevant. Sure the Raspberry Pi has been available for some time now, but has the awareness about them spread out of IT and into the minds of the business leaders? Are … Continue reading
Posted in Security Blog
Tagged 2014, hacking, kali, mitm, pwnpi, raspberry pi, Security Awareness, sniffing
Comments Off on The Raspberry Pi: Impact on Hacking