Monthly Archives: February 2014

Hacker Drones Hacking Drones

I love Hak5.org and their proof of concepts with real world practicality. It’s all fun and games and you get to peer into the hacker mind, where the combining of separate technologies can be turned from prank to cybercrime and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Hacker Drones Hacking Drones

Happy Valentine’s Day & Be Cautious

Posted in Security Blog | Tagged , , , | Comments Off on Happy Valentine’s Day & Be Cautious

Six Failures of Target’s Non-Compliance

Ira Winkler, is very well known champion in the security arena who is super busy and he still found time to write this article on ComputerWorld in regards to the 6 Failures of Target. To summarize the article, basically, there … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Six Failures of Target’s Non-Compliance

400Gbps DDoS using NTP

Amplification attacks using NTP are on the rise. The UDP-based protocol can use a small request and cause a heavy payload response. CloudFlare has done an outstanding job explaining how the following picture is possible. Read about it here on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on 400Gbps DDoS using NTP

Verizon’s 2014 PCI Compliance Report

The Verizon PCI Compliance Report is available here (good if you DON’T have Adobe Reader) or from it’s original location here (good if you DO have Adobe Reader). The Verizon 2014 PCI Compliance Report uses data and insights drawn directly … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Verizon’s 2014 PCI Compliance Report

Old and Tech Saavy

Do you know anything about QR code safety? If you don’t know what the QR code is for, don’t scan it! This may seem like a fun prank to try on your friends or whatnot, but how easy would it … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Old and Tech Saavy

SQLmap for Auto SQL Injection

Ultimate Peter demonstrates how easy it is to find a vulnerable to SQL injection website and uses SQLmap to quickly find the users and passwords. Remember, it is against the law to perform this type of testing on systems you … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on SQLmap for Auto SQL Injection

Albert Gonzalez

It’s hard not to be a little envious of the amazing technical skills and charismatic charm of Albert Gonzalez. Then again, I’m glad I haven’t done anything as crazy and super happy to not be serving a 20 year sentence. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Albert Gonzalez

Pat and Courtney Announce

Of course we knew back in December, but we weren’t allowed to say anything until Pat and Courtney were ready. We did a real good job keeping it under wraps. Here is Pat and Courtney’s Christmas present to the family … Continue reading

Posted in life | Comments Off on Pat and Courtney Announce

Targeting Compliance

As many of you may have heard, Target has had their customer databases compromised. From several sources, such as Krebs on Security and Information Week. The blame falls on Target relying on an external company who remotely manages the HVAC … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Targeting Compliance