November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,644 hits
Tag Archives: 2015
770,000 Records From One of Australia’s Largest Travel Insurance Companies
Around the number of 770,000 records of personal information consisting of travel insurance clients, names, phone numbers, email addresses, travel dates and prices for policies was stolen around December 18th. Aussie Travel Cover notified 3rd party agents, but did not … Continue reading
Posted in Security Blog
Tagged 2014, 2015, breach, Google Dorking, hacked, hackers, owasp, privacy, sql injection
Comments Off on 770,000 Records From One of Australia’s Largest Travel Insurance Companies
Beware Used or Discount Devices
Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading
Posted in Security Blog
Tagged 2015, badusb, buyer beware, hacked, hardware, keyboard, keylogger, malwre, mouse, peripherals, Security Awareness, spy, trojan, usb
Comments Off on Beware Used or Discount Devices
Hacker’s List
A new service is online where a person posts a problem to solve as a job and another person bids on the work if they know how to solve it. So far, most problems look to be in regards to: … Continue reading
19,000 French Websites Either Defaced or DDoS’ed
Since the three day terror attack that started in France on January 7 with the attack on satirical newspaper Charlie Hebdo, 19,000 websites of French-based companies have been targeted by cyber attackers. Defacements had the message: ‘The Islamic State Stay … Continue reading
Posted in Security Blog
Tagged 2015, cyber caliphate, DDoS, Death to Charlie, Death to France, Fallaga team, Free Palestine, Middle East Cyber Army, The Islamic State Stay Inchallah
Comments Off on 19,000 French Websites Either Defaced or DDoS’ed
LinkedIn Phishing
There has been a lot of phishing emails claiming to be from LinkedIn Support, designed to fool recipients into giving up their login credentials. The email uses a lowercase I instead of a capital i when spelling ‘Linkedln’ I promote … Continue reading
Posted in Security Blog
Tagged 2 factor, 2015, linkedin, passwords, phishing, social engineering, two-factor
Comments Off on LinkedIn Phishing
20150415 = Changes to CISSP Domains
Q: How is the CISSP exam changing? A: The CISSP exam is being updated to stay relevant amidst the changes occurring in the information security field. Refreshed technical content has been added to the Official (ISC)² CISSP CBK to reflect … Continue reading
Posted in CISSP-Study
Tagged 2015, CISSP, CISSP Study Requirements
Comments Off on 20150415 = Changes to CISSP Domains
New Scam, Don’t Click Court Ordered Appearance Notification
Bad guys are sending emails claiming to come from a real law firm called ‘Baker & McKenzie’. The email states you are scheduled to appear in court and should click a link to view a copy of the court notice. … Continue reading
Posted in Security Blog
Tagged 2015, beware, court, cybercrime, malware, Security Awareness, summons
Comments Off on New Scam, Don’t Click Court Ordered Appearance Notification
Vulnerability Found in Certain AMD Processor
A vulnerability was found in AMD Processors that insufficiently protected code signatures and other errors in the firmware could be used by hackers to inject software, which could then be executed by the System Management Unit and Accelerated Processing Units. … Continue reading
Posted in Security Blog
Tagged 2014, 2015, AMD, video tutorial, vulnerabilty
Comments Off on Vulnerability Found in Certain AMD Processor
Presidential Proposal List
As part in the President’s State of the Union address, Barack Obama is planning on: Insisting that companies reveal data breaches within 30 days Criminalizing the sale of botnets Criminalizing the sale of stolen U.S financial data The President’s twitter feed … Continue reading
Posted in Security Blog
Tagged 2015, cybersecurity, Information Technology Security Awareness, POTUS, President, Security Awareness
Comments Off on Presidential Proposal List
Non-Oracle sites offering Oracle ‘Fixes’/Malware
Oracle put out a press release, it reads: Warning It has come to our attention that there are non-Oracle sites offering Oracle ‘fixes’ for genuine Oracle error messages. You probably already don’t need to be told, however: Please do not … Continue reading
Posted in Security Blog
Tagged 2015, malware, Oracle, phishing, SEO, social eing
Comments Off on Non-Oracle sites offering Oracle ‘Fixes’/Malware