Tag Archives: phishing

Embed HTML Web App for Social Engineering Attack

In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Embed HTML Web App for Social Engineering Attack

BERserk Vulnerability

If you use FireFox or Chrome as a web browser, it is time to update them. The Mozilla Network Security Services (NSS) crypto library, a collection of cryptographic algorithms used for a variety of Internet standards currently allows for attackers … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on BERserk Vulnerability

Tabnabbing Attacks

The dangers of having too many tabs open. How The Attack Works A user navigates to your normal looking site. You detect when the page has lost its focus and hasn’t been interacted with for a while. Replace the favicon … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Tabnabbing Attacks

Goodwill/C&K Systems

Back when I posted about the 868,000 Payment Cards, 330 Stores, it was recently revealed that the exposure was due to C&K Systems. All 20 previously affected Goodwill members have stopped using C&K Systems to process customers’ payment cards… Earlier … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Goodwill/C&K Systems

Spearphishing and Why Education and Awareness is Important

It was revealed yesterday that after an investigation by the Nuclear Regulatory Commission (NRC), which oversees the US nuclear power grid, three incidents uncovered that hackers were able to access internal documents. One of the hacking incidents, involved emails sent … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Spearphishing and Why Education and Awareness is Important

Hacker Drones Stealing your Info

Yet another video on attaching some hacking equipment to a drone. The mobile Internet devices such as phones, tablets, and laptops will always be in need of protection and honestly, the inventors can only do so much. Companies require administrative … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Hacker Drones Stealing your Info

Nigerian Scams

Don’t fall for this…    

Posted in Security Blog | Tagged , , , , | Comments Off on Nigerian Scams

Hacker Drones Hacking Drones

I love Hak5.org and their proof of concepts with real world practicality. It’s all fun and games and you get to peer into the hacker mind, where the combining of separate technologies can be turned from prank to cybercrime and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Hacker Drones Hacking Drones