Tag Archives: 2015

Cyber Kidnapping

Of course, while dramatized for prime time audiences, the CSI: Cyber series, starting with episode 1 does have great information that is all too real. The show is available online right now here. I first wrote about baby monitors getting … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Cyber Kidnapping

Edward Snowden & John Oliver On Passwords

This is what it’s like explaining password complexity to normal people.

Posted in Security Blog | Tagged , , , , | Comments Off on Edward Snowden & John Oliver On Passwords

President Obama has made CyberSecurity a Priority

Five Things to Know: The Administration’s Priorities on Cybersecurity Protecting the country’s critical infrastructure β€” our most important information systems β€” from cyber threats. Improving our ability to identify and report cyber incidents so that we can respond in a … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on President Obama has made CyberSecurity a Priority

Ring! Ring! Yes, This is the I.R.S! NOT!

Criminals have been calling taxpayers and insisting they must “immediately give up their personal information or make a payment,” Don’t fall for it! It’s a scam! The I.R.S. will never call as their method is to send old fashioned mail. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Ring! Ring! Yes, This is the I.R.S! NOT!

Douglas County Sheriff Office Investigates Fraud

Recent reports of people receiving unsolicited fraudulent credit cards in the mail. β€œAt this time we believe that it may be part of the personal information breach involving insurance companies operating in Georgia,” the agency said in a news alert. … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Douglas County Sheriff Office Investigates Fraud

Uber Accounts, $1

Stolen Uber Customer accounts are for sale on the Dark Web for the low price of $1.00. Though most of the credit cards are masked, the last four and the expiration date are still available. The rest of the data … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Uber Accounts, $1

A Car is a Computer with Wheels

Your car is totally hackable. See more posts on Car Hacking

Posted in Security Blog | Tagged , , , , , , | Comments Off on A Car is a Computer with Wheels

Got $60? Reduce your Insurance Rates! Hack Your Car!

For the low price of $60, Eric Evenchick is selling a gadget that will allow a person to use a CANtact to talk directly to a vehicle’s CAN(controller area network)bus through the laptop, connected via USB to the CANtact device … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Got $60? Reduce your Insurance Rates! Hack Your Car!

Vawtrack Trojan Capabilities

Vawtrak is a banking Trojan that has been spreading in recent months. It infects victims via malware downloaders, exploit kits, or through drive-by downloads (e.g. spam email attachments or links). AVG has a white paper (pdf) full of details. Vawtrak … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Vawtrack Trojan Capabilities

NYPD Auxiliary Officer Hacking into NYPD Computer + FBI Database

Yehuda Katz, a New York City Police Department (NYPD) Auxiliary Deputy Inspector assigned to the 70th Precinct in Brooklyn, executed a scheme to hack into a restricted NYPD computer and other sensitive law enforcement databases. He was caught and brought … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on NYPD Auxiliary Officer Hacking into NYPD Computer + FBI Database