Monthly Archives: July 2014

Bad Contractors

Even more of a reason to have a solid Third Party Assessment program within your organization. Not one, or two, but three Israeli defense contractors who built the Iron Dome missile defense system were compromised by hackers. How were they … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Bad Contractors

80s Hacking

Too funny how Hollywood portrayed hacking in the 80s.

Posted in Security Blog | Tagged , , , | Comments Off on 80s Hacking

The Anti-Car-Hacking Gadget?

In December of 2013, US Senator Edward Markey sent a letter to car manufacturers in regards to securing vehicles against cyber-attacks. There is a $30 hacking kit that can be used to steal BMW cars and there is a $20 … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on The Anti-Car-Hacking Gadget?

This is Horribly Out of Tune

and awesome! Vijay Haripal created this horribly wonderful video. Very creative, right? No lie, I liked it.

Posted in Security Blog | Tagged , , | Comments Off on This is Horribly Out of Tune

My Google GPS Footprint

I was in Hawaii on vacation from the 4th of July to the 17th. If you have an Android phone with GPS on, you can access your location history. Now of course, like most technology, this can be really cool, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on My Google GPS Footprint

Hawaii 2014

We just got back from a 13 day vacation in Hawaii. We were in O’ahu and had a fairly busy schedule, but with so much time spent, we also had a couple of days where we didn’t do anything. That … Continue reading

Posted in life | Comments Off on Hawaii 2014

What is CyberRisk?

The definition of cyber risk is an exposure to the chance of injury or loss by means of computerized attack. Here is a great article about the six trends of Cyber Risk for 2014.

Posted in Security Blog | Tagged , , , | Comments Off on What is CyberRisk?

Lights, Camera, Hacktion

A vulnerability was found by some white-hat hackers who researched how to obtain the wifi passwords of homes that had super cool lights that could be turned on, off, or dimmed by an app on a phone (both IOS and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Lights, Camera, Hacktion

The Study of a Thousand Breaches

According to this study, “Despite everything you’re read about cyber security, despite all the breaches in the news, the fact is well-intentioned business people are still surprisingly behind the times.” Hackers aren’t the only ones to blame when a breach … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Study of a Thousand Breaches

Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?

Lorrie Faith Cranor studied thousands of real passwords to figure out the surprising, very common mistakes that users — and secured sites — make to compromise security. And how, you may ask, did she study thousands of real passwords without … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Tedx CMU: Lorrie Faith Cranor: What’s wrong with your pa$$w0rd?