Tag Archives: 2015

An Intro To Recon-ng Pushpin

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on An Intro To Recon-ng Pushpin

Protecting Personal Information

Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Protecting Personal Information

How I Feel About Going to Work Tomorrow

The bottom text of the above graphic is from; “The Spartans used to ask about the enemy, it was not important how many there are, but where the enemy was” Plutarch (46-125 bc), Apophthegmata Laconica, Agis of Anaxandridas, 3 Agesilaos (Eurypontid … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on How I Feel About Going to Work Tomorrow

5 Security Quotes

“Companies spend millions of dollars on firewalls, encryption, and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.” – Kevin Mitnick   “If you think technology can solve your … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 5 Security Quotes

Harvesting Birthdays

When participating in social media, there are all sorts of fun things to be part of, like “Who would be in your Zombie Apocalypse team?”. Though it’s fun, it’s also easy to give up your personal information. Why the heck … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Harvesting Birthdays

Stealing Biometrics & Bypassing Authentication

Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Stealing Biometrics & Bypassing Authentication

Basic Computer Security

There’s a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. 1. Install security software: There is a lot of security software available and most well … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Basic Computer Security

Publicizing to Facebook

I believe that in order to make the Internet a safer place, we should spread security awareness. For some time now, I have blogged about CyberSecurity and Security Awareness. Throughout 2014, I have devoted a lot of time to it … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Publicizing to Facebook

Happy New Year!

As 2014 sunsets for the final time tonight, and 2015 rises tomorrow, let’s make a joint resolution, resolve to: Educate your employees, customers, friends, and family Create a response plan and practice it. what to do if your Identity is … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Happy New Year!