January 2025 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,937 hits
Tag Archives: 2014
Privacy Comic: The Phone Book
It wasn’t that long ago that if you wanted to find somebody, you just looked in the phone book. It’s a little more evolved now.
Conmen Evolved
Unless you are completely off the grid and don’t even read newspapers, it is hard to avoid the data breaches announced in the news. It’s not just techie news anymore either, with the big named news shows on the television … Continue reading
Posted in Security Blog
Tagged 2014, breach, Information Technology Security Awareness, phishing, Security Awareness, social engineering
Comments Off on Conmen Evolved
Marine Corps Birthday Message 2014
Happy birthday my brothers and sisters!
Posted in Security Blog
Tagged 2014, Marine Corps, USMC
Comments Off on Marine Corps Birthday Message 2014
The Postal Service Suffered a Cybersecurity Breach
The data of 800,000 people potentially compromised for employee and customer personal information, including addresses, Social Security numbers and emails. The USPS is working with the FBI, Justice Department and the U.S. Computer Emergency Readiness Team to investigate the breach. … Continue reading
Posted in Security Blog
Tagged 2014, breach, Information Technology Security Awareness, phishing, Security Awareness, social engineering, USPS
Comments Off on The Postal Service Suffered a Cybersecurity Breach
Operation Onymous… 414 Onion sites Taken Offline/Seized
Tor (The Onion Router) is an anonymizing program that allows access to the Dark Web, it works by basically routing packets through an anonymous proxy network. (See Searching the Deep Web) Europol, the FBI, and the Department of Homeland Security, … Continue reading
Posted in Security Blog
Tagged .onion, 2014, cybercrime, dark web, Department of Homeland Security, Europol, FBI, hackers, Operation Onymous, tor
Comments Off on Operation Onymous… 414 Onion sites Taken Offline/Seized
Brain-to-Brain Communication Over the Internet
Wow, that’s cool! I would like to coin the phrase “Cybernotic Suggestion” for when brain-to-brain communication over the Internet is subject to a man-in-the-middle attack and the receiving end of the mind comm. gets suggested brain waves.
Posted in Security Blog
Tagged 2014, brain-to-brain, communication, Cybernotic Suggestion, man-in-the-middle, mitm, Security Awareness
Comments Off on Brain-to-Brain Communication Over the Internet
Remember, Remember, The 5th of November
Anonymous is a truth movement advocating hacktivism as self-defense for unconstitutional government. It is our aim to shed light on corrupt government in order to set people free from oppression. Read more about the Million Mask March. Guy Fawkes is … Continue reading
Posted in Security Blog
Tagged 2014, 5th of November, anonymous, Guy Fawkes, Million Mask March
Comments Off on Remember, Remember, The 5th of November
Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99
“With just a mobile phone we created a POS terminal that could read a card through a wallet,” explains Martin Emms, from the NewCastle University research team during the 2014 ACM CCS Conference held in the city of Scottsdale, Arizona, … Continue reading
Posted in Security Blog
Tagged 2014, contactless payment card, credit card, foreign currency, PCI Compliance, risk, visa
Comments Off on Contactless Payment Cards Will Approve Foreign Currency Transactions of up to 999,999.99
OS X 10.10 rootpipe
rootpipe, a privilege escalation vulnerability in OS X version 10.10, allows attackers to completely bypass logging in and gaining the highest administration privilege on a Mac. To protect against it, create a new admin user and remove the admin rights … Continue reading
Posted in Security Blog
Tagged 2014, mac, OS X, remote code execution, root pipe, rootpipe, vulnerability
Comments Off on OS X 10.10 rootpipe
AirHopper. Keylogging Disconnected Computers.
AirHopper demonstrates how textual and binary data can be ex-filtrated from physically an isolated computer to mobile phones at a distance of 1-7 meters, with effective bandwidth of 13 to 60 bps. Enough to steal a password. The technology works … Continue reading
Posted in Security Blog
Tagged 2014, airhopper, hacking, isolated, keylogging, mobile, no connection no problem, video display adapter radiation
Comments Off on AirHopper. Keylogging Disconnected Computers.