November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,590 hits
Tag Archives: 2015
An Intro To Recon-ng Pushpin
Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly … Continue reading
Posted in Security Blog
Tagged 2015, phishing, recon-ng, Reconnaissance, social engineering, video tutorial
Comments Off on An Intro To Recon-ng Pushpin
Protecting Personal Information
Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, passwords, Protect Your Personal Information, two-factor
Comments Off on Protecting Personal Information
How I Feel About Going to Work Tomorrow
The bottom text of the above graphic is from; “The Spartans used to ask about the enemy, it was not important how many there are, but where the enemy was” Plutarch (46-125 bc), Apophthegmata Laconica, Agis of Anaxandridas, 3 Agesilaos (Eurypontid … Continue reading
Posted in Security Blog
Tagged 2015, carpe diem, Leonidas, seize the day
Comments Off on How I Feel About Going to Work Tomorrow
5 Security Quotes
“Companies spend millions of dollars on firewalls, encryption, and secure access devices, and it’s money wasted, because none of these measures address the weakest link in the security chain.” – Kevin Mitnick “If you think technology can solve your … Continue reading
Posted in Security Blog
Tagged 2015, Bruce Schneier, Kevin Mitnick, Security Quotes, Stewart Kirkpatrick
Comments Off on 5 Security Quotes
Harvesting Birthdays
When participating in social media, there are all sorts of fun things to be part of, like “Who would be in your Zombie Apocalypse team?”. Though it’s fun, it’s also easy to give up your personal information. Why the heck … Continue reading
Posted in Security Blog
Tagged 2015, birthdays, cybercrime, fullz, harvesting, Security Awareness, social engineering
Comments Off on Harvesting Birthdays
Stealing Biometrics & Bypassing Authentication
Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading
Posted in Security Blog
Tagged 2015, biometrics, Chaos Computer Club, facial recognition, fingerprints, hackers, hacking, Information Technology Security Awareness, Jan Krissler, proof of concept, retina, two-factor, video tutorial
Comments Off on Stealing Biometrics & Bypassing Authentication
Basic Computer Security
There’s a lot you can do to protect yourself and your computer from scammers, hackers, and identity thieves. Start by keeping your computer software up-to-date. 1. Install security software: There is a lot of security software available and most well … Continue reading
Posted in Security Blog
Tagged 2015, back to basics, basics, computer security, Information Technology Security Awareness, keep a clean machine
Comments Off on Basic Computer Security
Publicizing to Facebook
I believe that in order to make the Internet a safer place, we should spread security awareness. For some time now, I have blogged about CyberSecurity and Security Awareness. Throughout 2014, I have devoted a lot of time to it … Continue reading
Posted in Security Blog
Tagged 2015, Facebook, Security Awareness
Comments Off on Publicizing to Facebook
Happy New Year!
As 2014 sunsets for the final time tonight, and 2015 rises tomorrow, let’s make a joint resolution, resolve to: Educate your employees, customers, friends, and family Create a response plan and practice it. what to do if your Identity is … Continue reading