Tag Archives: hacking

Stock Photo Hackers

Posted in Security Blog | Tagged , , | Comments Off on Stock Photo Hackers

Today Show: Hacker Hijack

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Today Show: Hacker Hijack

CIA Hacking Tools

According to Wikileaks Recently, the CIA lost control of the majority of its hacking arsenal including malware, viruses, trojans, weaponized “zero day” exploits, malware remote control systems and associated documentation. This extraordinary collection, which amounts to more than several hundred … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on CIA Hacking Tools

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

Dyn Down by DDoS

Dyn a company that provides dynamic domain name resolution (convert names into IP addresses) was threatened to shell out some bitcoin or else… Or else what? I’d like to call it an availability compromise, but in layman’s terms, an outage … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Dyn Down by DDoS

Tech Support Scam Infographic

Here is a cool infographic that Microsoft created. I love infographics with numbers in them. 50% of Millennials are normally scammed. 34% are about my age. 17% are old… like my boss at work :)

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Tech Support Scam Infographic

The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Denial of Service explained: Computers respond to network traffic, generally. If there was a computer on my network that wanted to talk to my computer, that computer would put out a request to talk to my computer over the network, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on The Largest Distributed Denial of Service, EVER! (A Robot Knock-Knock Description)

Mr Robot

Posted in Security Blog | Tagged , , , | Comments Off on Mr Robot

What to Watch To Learn A Little CyberSecurity

Do you like to be entertained? I know I do! Here are some shows and movies that I recommend. Brian Brushwood’s Hacking the System

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on What to Watch To Learn A Little CyberSecurity

Accurate Hacking Scene?

Most accurate hacking scene ever! Don’t you just love some hacking on tv?

Posted in Security Blog | Tagged , , , | Comments Off on Accurate Hacking Scene?