Tag Archives: video tutorial

Don’t be a Billy: NCSAM

A fun, old-ish video on Cyber security.

Posted in Security Blog | Tagged , , | Comments Off on Don’t be a Billy: NCSAM

Let the Data Tell Your Story

Big data doesn’t necessarily mean good data. This presentation, created Aug 25 2015, makes us realize that bad guys have the good data and it enables them to keep attacking successfully. (It’s a 47 minutes presentation)

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Let the Data Tell Your Story

Social Engineering Fraud Videos

Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Social Engineering Fraud Videos

Vulnerability Found in Certain AMD Processor

A vulnerability was found in AMD Processors that insufficiently protected code signatures and other errors in the firmware could be used by hackers to inject software, which could then be executed by the System Management Unit and Accelerated Processing Units. … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Vulnerability Found in Certain AMD Processor

An Intro To Recon-ng Pushpin

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on An Intro To Recon-ng Pushpin

Stealing Biometrics & Bypassing Authentication

Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Stealing Biometrics & Bypassing Authentication

8 Videos on Strategic Planning Management

It’s easy to forget some of the basics that I don’t deal with every day. Erica gives a great review without getting too deep into it all. Erica Olsen seems to know her stuff.

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 8 Videos on Strategic Planning Management

Smartwatch to Smartphone Data Interception

Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Smartwatch to Smartphone Data Interception

Reuben Paul, an 8-year-old Cyber Professional and CEO

An extension from this old post, the 8 year old, identified as Reuben Paul, has grown in fame. He demonstrates in this video, some of his mastery of hacking tools and his thought processes. Here is an article/interview from Tripwire.

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Reuben Paul, an 8-year-old Cyber Professional and CEO

Microsoft’s Safer Online Videos #NCSAM

The Internet’s Most Wanted! Subscribe to the Microsoft Safer Online Youtube channel here.

Posted in Security Blog | Tagged , , , , | Comments Off on Microsoft’s Safer Online Videos #NCSAM