Tag Archives: video tutorial

2-Factor on LinkedIn

If you use LinkedIn, like I do. Enable 2-factor authentication to keep your professional profile and contacts secured. How embarrassing would it be if you are advertising yourself as a security and privacy professional and someone gets into your account … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 2-Factor on LinkedIn

Social Engineering – How to Scam Your Way into Anything

A great video by Brian Brushwood, from Scam School, on Social Engineering. The video quotes the following books:

Posted in Security Blog | Tagged , , , , , | Comments Off on Social Engineering – How to Scam Your Way into Anything

How Tyupkin, the ATM Malware, Works

The hack, known as Tyupkin, requires criminals to enter a unique code into a machine that has already been compromised by the malware. A second Pin code – a random sequence of numbers generated at another location – is also … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on How Tyupkin, the ATM Malware, Works

NOVA Labs – Cybersecurity Lab

I stumbled upon a little jewel yesterday when I found PBS Presents: The Secret Lives of Hackers. The video is nicely done, but what’s more is the website that the video was originally posted on. PBS, the Public Broadcasting Service, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on NOVA Labs – Cybersecurity Lab

PBS Presents: The Secret Lives of Hackers

Found here

Posted in Security Blog | Tagged , , | Comments Off on PBS Presents: The Secret Lives of Hackers

FEMA Federal Emergency Management Agency on #NCSAM

Post by FEMA Federal Emergency Management Agency.

Posted in Security Blog | Tagged , , , , , | Comments Off on FEMA Federal Emergency Management Agency on #NCSAM

Chris Pirillo on National Cyber Security Awareness Month #NCSAM

This video is from 3 years ago. So some of the talk is a little dated. The NCSAM campaign is intended to help spread awareness of the importance of good Web browsing practices. Cyber security is a shared responsibility, and … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Chris Pirillo on National Cyber Security Awareness Month #NCSAM

BadUSB MalWare Tutorial

Here is an intro to BadUSB BadUSB can be installed on a USB device to completely take over a PC, invisibly alter files installed from the memory stick, or even redirect the user’s internet traffic. BadUSB resides in the firmware … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on BadUSB MalWare Tutorial

Embed HTML Web App for Social Engineering Attack

In this video, Armitage shows how to create a tiny web application that can be hosted that will allow a user to install a beacon. Once the beacon is installed, numerous bad things can happen as you can see in … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Embed HTML Web App for Social Engineering Attack

Old Android Browser, iOS8, & Home Depot

I love these 60 second updates by Sophos.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Old Android Browser, iOS8, & Home Depot