Tag Archives: 2015

US Army Releases Cyber-Forensic Dshell Code

Available here on github, The Army Research Labs has publicly released a tool to help with network forensic analysis.

Posted in Security Blog | Tagged , , , , , , | Comments Off on US Army Releases Cyber-Forensic Dshell Code

Hacking Too Much Time!!!

This re-donk-ulously awesome movie needs to happen. Post by NERD RAGE.

Posted in Security Blog | Tagged , | Comments Off on Hacking Too Much Time!!!

110,000 People are Looking For Love in all the Wrong Places

and getting a nasty infection too. A click-bait trick where a picture is made to look like a video that ‘requires’ Flash is circulating Facebook. The malware installs a Trojan to the computer, allowing the mouse and keyboard to be … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on 110,000 People are Looking For Love in all the Wrong Places

Stupidest Movie Hacks

Dorkly had this posted, it’s worth a good chuckle!

Posted in Security Blog | Tagged , , | Comments Off on Stupidest Movie Hacks

Spear Phishing

Cyber thieves stole nearly $215 million from businesses in the last 14 months using email scams. Once a high level exec has his or her email compromised, the bad guys lurk, learn the schedules, learn the business, learn the business … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Spear Phishing

Data Privacy Day: 2015

Every January 28th, is Data Privacy Day. A good reminder to police yourself and clean up your digital footprint you left on the Internet. The 2nd Annual Report on How Personal Technology is Changing Our Lives, reports that Privacy is … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Data Privacy Day: 2015

DOE Grants $25 Million for Cybersecurity Education

The Department of Energy announced it will provide $25 million in funding over the next five years to support cybersecurity education at more than a dozen Historically Black Colleges and Universities. As highlighted by the President earlier a couple weeks … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on DOE Grants $25 Million for Cybersecurity Education

Doxing

Here are some doxing tutorials.

Posted in Security Blog | Tagged , , , , | Comments Off on Doxing

Under 11 Minutes to Crack WiFi for 7 Year Old

Seven-year-old Betsy Davis, using only youtube videos for knowledge, was able to find out how to hack the controlled environment’s public WiFi. She set up a rogue access point for a Man-in-the-Middle (MitM) attack, which allowed her to steal data … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Under 11 Minutes to Crack WiFi for 7 Year Old

Cisco’s 2015 Security Report

Cisco said Java represented a whopping 91 percent of all indicators of compromise, the best way to combat it? With some good old fashioned Security Awareness. Cisco’s 2015 annual security report,  was released last week. As part of its report, … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Cisco’s 2015 Security Report