November 2024 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 Blog Stats
- 75,634 hits
Tag Archives: video tutorial
Don’t be a Billy: NCSAM
A fun, old-ish video on Cyber security.
Posted in Security Blog
Tagged cyber risk, NCSAM, video tutorial
Comments Off on Don’t be a Billy: NCSAM
Let the Data Tell Your Story
Big data doesn’t necessarily mean good data. This presentation, created Aug 25 2015, makes us realize that bad guys have the good data and it enables them to keep attacking successfully. (It’s a 47 minutes presentation)
Posted in Security Blog
Tagged 2015, breach, hackers, information security, Information Technology Security Awareness, risk, risk analysis, security, video tutorial
Comments Off on Let the Data Tell Your Story
Social Engineering Fraud Videos
Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading
Posted in Security Blog
Tagged Chubb, Derbycon, Jamison Scheeres, Security Awareness, social engineering, video tutorial
Comments Off on Social Engineering Fraud Videos
Vulnerability Found in Certain AMD Processor
A vulnerability was found in AMD Processors that insufficiently protected code signatures and other errors in the firmware could be used by hackers to inject software, which could then be executed by the System Management Unit and Accelerated Processing Units. … Continue reading
Posted in Security Blog
Tagged 2014, 2015, AMD, video tutorial, vulnerabilty
Comments Off on Vulnerability Found in Certain AMD Processor
An Intro To Recon-ng Pushpin
Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly … Continue reading
Posted in Security Blog
Tagged 2015, phishing, recon-ng, Reconnaissance, social engineering, video tutorial
Comments Off on An Intro To Recon-ng Pushpin
Stealing Biometrics & Bypassing Authentication
Using today’s common high resolution smart phones, it’s possible to remotely enable a camera, and pull someone’s PIN in the reflection of their screen off the user’s eye! This is one of the reasons we shouldn’t install apps, like the … Continue reading
Posted in Security Blog
Tagged 2015, biometrics, Chaos Computer Club, facial recognition, fingerprints, hackers, hacking, Information Technology Security Awareness, Jan Krissler, proof of concept, retina, two-factor, video tutorial
Comments Off on Stealing Biometrics & Bypassing Authentication
8 Videos on Strategic Planning Management
It’s easy to forget some of the basics that I don’t deal with every day. Erica gives a great review without getting too deep into it all. Erica Olsen seems to know her stuff.
Posted in Security Blog
Tagged 2014, back to basics, Erica Olsen, Kaplan and Norton, KPIs, OnStrategyHQ, Strategic Planning, strategy, SWOT, video tutorial
Comments Off on 8 Videos on Strategic Planning Management
Smartwatch to Smartphone Data Interception
Data sent between a Smartwatch and an Android smartphone could be a subject to brute force hacks to intercept and decode users’ data, including everything from text messages to Google Hangout chats and Facebook conversations. Liviu Arsene explains. Read more … Continue reading
Posted in Security Blog
Tagged 2014, android, bluetooth, cyber risk, Google, nfc, risk, smart-watch, sniffing, video tutorial, wearables
Comments Off on Smartwatch to Smartphone Data Interception
Reuben Paul, an 8-year-old Cyber Professional and CEO
An extension from this old post, the 8 year old, identified as Reuben Paul, has grown in fame. He demonstrates in this video, some of his mastery of hacking tools and his thought processes. Here is an article/interview from Tripwire.
Posted in Security Blog
Tagged 2014, 8 year old, hackers, hacking, Information Technology Security Awareness, kid hacker, Reuben Paul, social engineering, video tutorial
Comments Off on Reuben Paul, an 8-year-old Cyber Professional and CEO
Microsoft’s Safer Online Videos #NCSAM
The Internet’s Most Wanted! Subscribe to the Microsoft Safer Online Youtube channel here.
Posted in Security Blog
Tagged 2014, computer security, Information Technology Security Awareness, Security Awareness, video tutorial
Comments Off on Microsoft’s Safer Online Videos #NCSAM