Tag Archives: Information Technology Security Awareness

Thanks Siri… “Smart Lock” Lets the Neighbor In

Someone decided to automate his house with Philips Hue LED lights bulbs you can turn on with your phone, Ecobee Wi-Fi thermostats and remote temperature sensors for the house. He also bought himself an August Smart Lock: a Bluetooth-enabled lock … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Thanks Siri… “Smart Lock” Lets the Neighbor In

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Wireless Mice Leave Corporate Networks Vulnerable To Attack

Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack

VTech Electronic Toys Suffers Privacy Leak

An anonymous (not the group) hacker got into the VTech toy makers servers and downloaded 190 GB of data that included pictures of parents, kids, and chat logs between the parents and their children. That’s about 4.8 million registered users … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on VTech Electronic Toys Suffers Privacy Leak

Telemarketer Payback with Social Engineering

Social engineering is a very useful skill to have. But please use your powers with the highest level of ethics. See image below.

Posted in Security Blog | Tagged , , , | Comments Off on Telemarketer Payback with Social Engineering

Stop. Think. Connect. Tips Infographic!

Here’s an awesome infographic on Stop. Think. Connect. Which is a National Cyber Security Awareness initiative by the National Cyber Security Alliance and the U.S. Department of Homeland Security. Learn more here.

Posted in Security Blog | Tagged , , , | Comments Off on Stop. Think. Connect. Tips Infographic!

Bypass Physical Security Using the Help of a Craigslist Job Ad

I spy, with my pi. A job ad was found on craigslist where some bad actors are hiring and paying up to $50/month to anyone who doesn’t adhere to their security policies and is willing to plug in a Raspberry … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Bypass Physical Security Using the Help of a Craigslist Job Ad

October is National Cyber Security Awareness Month!

National Cyber Security Awareness Month kicks off with STOP. THINK. CONNECT’s 5th Anniversary. Take a look at the week’s description and key messages. Also included are examples of how you can get involved, learn more and stay in touch. Also, … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on October is National Cyber Security Awareness Month!

19 Laws of Information Security

Law #1: If a bad guy can persuade you to run his program on your computer, it’s not solely your computer anymore. Law #2: Nobody believes anything bad can happen to them, until it does. Law #3: If a bad … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 19 Laws of Information Security

Let the Data Tell Your Story

Big data doesn’t necessarily mean good data. This presentation, created Aug 25 2015, makes us realize that bad guys have the good data and it enables them to keep attacking successfully. (It’s a 47 minutes presentation)

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Let the Data Tell Your Story