December 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blog Stats
- 75,849 hits
Tag Archives: Information Technology Security Awareness
Thanks Siri… “Smart Lock” Lets the Neighbor In
Someone decided to automate his house with Philips Hue LED lights bulbs you can turn on with your phone, Ecobee Wi-Fi thermostats and remote temperature sensors for the house. He also bought himself an August Smart Lock: a Bluetooth-enabled lock … Continue reading
Posted in Security Blog
Tagged Apple, home automation, homekit, Information Technology Security Awareness, Internet of Things, iOS 10.0.2, IoT, iPad, lights, passwords, privacy, Security Awareness, siri, wifi
Comments Off on Thanks Siri… “Smart Lock” Lets the Neighbor In
Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity
Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!
Posted in Security Blog
Tagged 2016, CIA, cyber risk, hackers, hacking, information security, Information Technology Security Awareness, Security Awareness, Security Strategy, SSA, Will Hurd
Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity
Wireless Mice Leave Corporate Networks Vulnerable To Attack
Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading
Posted in Security Blog
Tagged 2016, bastille, bluetooth, hacking, information security, Information Technology Security Awareness, keyboard, mouse, reuters, security, wireless
Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack
VTech Electronic Toys Suffers Privacy Leak
An anonymous (not the group) hacker got into the VTech toy makers servers and downloaded 190 GB of data that included pictures of parents, kids, and chat logs between the parents and their children. That’s about 4.8 million registered users … Continue reading
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, privacy, Security Awareness
Comments Off on VTech Electronic Toys Suffers Privacy Leak
Telemarketer Payback with Social Engineering
Social engineering is a very useful skill to have. But please use your powers with the highest level of ethics. See image below.
Posted in Security Blog
Tagged Information Technology Security Awareness, lol, social engineering, telemarketer
Comments Off on Telemarketer Payback with Social Engineering
Stop. Think. Connect. Tips Infographic!
Here’s an awesome infographic on Stop. Think. Connect. Which is a National Cyber Security Awareness initiative by the National Cyber Security Alliance and the U.S. Department of Homeland Security. Learn more here.
Posted in Security Blog
Tagged 2015, Information Technology Security Awareness, NCSAM, Security Awareness
Comments Off on Stop. Think. Connect. Tips Infographic!
Bypass Physical Security Using the Help of a Craigslist Job Ad
I spy, with my pi. A job ad was found on craigslist where some bad actors are hiring and paying up to $50/month to anyone who doesn’t adhere to their security policies and is willing to plug in a Raspberry … Continue reading
Posted in Security Blog
Tagged 2015, craigslist, hackers, Information Technology Security Awareness, Security Awareness, sniffing
Comments Off on Bypass Physical Security Using the Help of a Craigslist Job Ad
October is National Cyber Security Awareness Month!
National Cyber Security Awareness Month kicks off with STOP. THINK. CONNECT’s 5th Anniversary. Take a look at the week’s description and key messages. Also included are examples of how you can get involved, learn more and stay in touch. Also, … Continue reading
Posted in Security Blog
Tagged #CyberAware, 2015, cybersecurity, infographic, Information Technology Security Awareness, NCSAM, Security Awareness, STOP. THINK. CONNECT.
Comments Off on October is National Cyber Security Awareness Month!
19 Laws of Information Security
Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading
Posted in Security Blog
Tagged 2015, Immutable Laws, information security, Information Technology Security Awareness, Security Awareness
Comments Off on 19 Laws of Information Security
Let the Data Tell Your Story
Big data doesn’t necessarily mean good data. This presentation, created Aug 25 2015, makes us realize that bad guys have the good data and it enables them to keep attacking successfully. (It’s a 47 minutes presentation)
Posted in Security Blog
Tagged 2015, breach, hackers, information security, Information Technology Security Awareness, risk, risk analysis, security, video tutorial
Comments Off on Let the Data Tell Your Story