December 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,849 hits
Tag Archives: 2015
Fake Profiles on LinkedIn, a Gateway to SpearPhishing Attacks
Posing as recruiters, the LinkedIn fake accounts allow hackers to map the networks of business professionals and gain the trust of those in them. Symantec has worked with LinkedIn to remove all of the fake accounts it identified. By making … Continue reading
Posted in Security Blog
Tagged 2015, fraud, phishing, privacy, Security Awareness, spear phishing, spearphishing
Comments Off on Fake Profiles on LinkedIn, a Gateway to SpearPhishing Attacks
VTech Electronic Toys Suffers Privacy Leak
An anonymous (not the group) hacker got into the VTech toy makers servers and downloaded 190 GB of data that included pictures of parents, kids, and chat logs between the parents and their children. That’s about 4.8 million registered users … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, privacy, Security Awareness
Comments Off on VTech Electronic Toys Suffers Privacy Leak
Cyber Monday…. Scammers Are Coming!
As you know, with Cyber Monday coming up and all the online shopping you are all doing, you and everybody you know will be hit in the email and all over your social media with probable scams. Be Aware and … Continue reading
Posted in Security Blog
Tagged 2015, fraud, hackers, infographic, Security Awareness
Comments Off on Cyber Monday…. Scammers Are Coming!
Police Body Cameras Infected with Conficker Worm
Conficker is a computer worm targeting the Microsoft Windows operating system that was first detected in November 2008. It uses flaws in Windows OS software and dictionary attacks on administrator passwords to propagate while forming a botnet, and has been unusually … Continue reading
Posted in Security Blog
Tagged 2008, 2015, body cameras, computer worm, conficker, downadup, downup, gps, infection, Internet of Things, IoT, iPower, kido, Martel, Microsoft Windows, Police, Windows
Comments Off on Police Body Cameras Infected with Conficker Worm
A Different Terror in France!
Airport systems in Paris Orly International Airport use a system called DECOR, which is used by air traffic controllers to communicate weather information to pilots. Pilots rely on the system when weather conditions are poor. The problem with DECOR is … Continue reading
Posted in Security Blog
Tagged 2015, Airplane, compliance, France, Microsoft Windows, Orly
Comments Off on A Different Terror in France!
Cybersecurity Bill of Rights Adopted by NAIC
On October 14th, 2015, the National Association of Insurance Commissioners (co-developer of the Model Audit Rule) has adopted the Cybersecurity Bill of Rights The Cybersecurity Bill of Rights describes what you can expect from insurance companies, agents, and other … Continue reading
Posted in Security Blog
Tagged 2015, compliance, information security, privacy, risk, security
Comments Off on Cybersecurity Bill of Rights Adopted by NAIC
SPY Car!
Is a name for an Act for the “Security and Privacy in Your Car Act of 2015. An act that requires automakers to adhere to certain standards of protection against privacy and hacking that would be developed by the Federal … Continue reading
Posted in Security Blog
Tagged 2015, Arxan, car hacking, Charlie Miller, Chris Valasek, Ed Markey, infographic, SPY Car, SPY Car Act of 2015
Comments Off on SPY Car!
Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson
Posted in Security Blog
Tagged 2015, CIA, CIA Director John Brennan, email, email fraud, hacked, Homeland Security Secretary Jeh Johnson, Security Awareness, social engineering
Comments Off on Resetting the Passwords for CIA Director John Brennan and Homeland Security Secretary Jeh Johnson
Your Evolving Digital Life
Click the graphic to learn more about NCSAM!
Posted in Security Blog
Tagged 2015, computer security, infographic, Internet of Things, NCSAM, Security Awareness
Comments Off on Your Evolving Digital Life
USB Killer… 2.0!
Do you remember, back in March, when I wrote about using a USB key that could fry a computer and actually make it catch on fire? Well, it’s been improved upon, version 2.0 was created. It works super fast as … Continue reading
Posted in Security Blog
Tagged 2.0, 2015, computer security, Dark Purple, hacking, malware, mission impossible, usb, USB Killer
Comments Off on USB Killer… 2.0!