Tag Archives: 2015

IBM Z13 Mainframe: Fast and Promotes Secure Process

IBM unveiled its z13 mainframe, a computer system and says is the most powerful and secure ever built. When a single transaction triggers, as many as 100 others that must be run in order to analyze past purchases, data encryption … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on IBM Z13 Mainframe: Fast and Promotes Secure Process

U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate

The United States Central Command (USCENTCOM) is a theater-level Unified Combatant Command of the U.S. Department of Defense, established in 1983. It was originally conceived of as the Rapid Deployment Joint Task Force (RDJTF). Its area of responsibility includes countries … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on U.S. Central Command @CentCom Twitter and YouTube Take Down by CyberCaliphate

Blackhat Behind the Scenes Movie Trailer

Back in September, I wrote about Thor being a black hat hacker. Here is the behind the scenes extended trailer. The trailer seems pretty good with some research on the back end. I hope the actual movie is good! Post … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Blackhat Behind the Scenes Movie Trailer

Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee

This was in the news yesterday, it is proof that social engineering is the master key to unlock many locks. It is also proof that to keep your lock secured, security awareness and training is needed with the end goal … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , | Comments Off on Stuart Varney, Fox Host, Gets Demo-Hacked By John McAfee

The Raven

An adaptation of Edgar Allen Poe’s famous poem of the Raven. Once upon a midnight dreary, while I pondered weak and weary, Over many a quaint and curious volume of forgotten security lore. While I nodded, nearly napping, suddenly there … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on The Raven

OpenSSL: 8 Bugs Fixed

First off, I’d like to explain what OpenSSL is! OpenSSL refers to the name of a 1998 project that was started to encrypt websites and user information across the Web. The “SSL” in “OpenSSL” refers to a Secure Sockets Layer … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on OpenSSL: 8 Bugs Fixed

On June 30th at 23:59:59, Some Internet Might Crash

Earth’s rotational time has slowed by 1 second. Earth is slowing down due to earthquakes, tidal drag, and the weather, and losing approximately two thousandths of a second every day. To allow for syncing up atomic clock time with the Earth’s … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on On June 30th at 23:59:59, Some Internet Might Crash

SaveMe App is Actually SocialPath Malware for Android Phones

The Save Me app claims to be able to save a user’s contacts and other data including photos and videos, in the event that a mobile device is lost or stolen but it actually contains a variant of information-stealing malware … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on SaveMe App is Actually SocialPath Malware for Android Phones

CyberBerkut

Head of the German governmental press and information agency said in a news conference that the government websites including Chancellor Angela Merkel’s page have been attacked. The CyberBerkut pro-Russian and hacktivist organization has claimed the cyber attack. They even stated … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on CyberBerkut

Is 2015 Going to be Similar to 2014 in Breaches?

On January 2nd, Chick-fil-A released a statement in regards to the security breach they found out about on December 19th, 2014. One unnamed financial institution said it received an alert that contained “nearly 9,000 customer cards” for a breach that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Is 2015 Going to be Similar to 2014 in Breaches?