Monthly Archives: November 2014

Cyber Monday is Tomorrow, Please be Cyber Secure

Be sure to stop and think about where you are when you are out and about, don’t use public wifi hotspots. It’s cyber hunting time and your data is the target and it is very easy for malicious evil doers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Cyber Monday is Tomorrow, Please be Cyber Secure

1st Duqu. Next came Stuxnet. Now Regin.

An “extremely complex” and “stealthy” Stuxnet Equivalent spying program has been stealing data from ISPs, energy companies, airlines and research-and-development labs. Regin is a multi-staged threat and each stage is hidden and encrypted, with the exception of the first stage. … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on 1st Duqu. Next came Stuxnet. Now Regin.

Jaime’s Birthday!

My sweet little wife had her birthday and we went to Zoolights with the family to celebrate! Jaime, Pat, Courtney, and Beau have never been before. So it was nice bringing everybody to check out the awesome ZooLights at the … Continue reading

Posted in life | Tagged , , , , , , , , | Comments Off on Jaime’s Birthday!

Need a New Password? Try Passweird

Passweird is a fun and interesting way to generate a password that meets most regulatory compliance password requirements. In other news, Cyber thieves have started targeting the password managers, like KeePass.

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Need a New Password? Try Passweird

#FeministHackerBarbie

If you haven’t seen #FeministHackerBarbie, you must! #FeministHackerBarbie is great! — Carmelo Walsh, CISSP (@CaRMCyberSec) November 22, 2014

Posted in Security Blog | Tagged , , | Comments Off on #FeministHackerBarbie

Chinese Made eCigarette USB Malware Phones Home

It was found that some Chinese made eCigarettes and their USB charging cables, have been made with malware built right in. When plugged into a computer, it phoned home. Is this a true story or a hoax? Hard to tell … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Chinese Made eCigarette USB Malware Phones Home

Google Infographic on Account Hijackers

They have a great article here for more information.

Posted in Security Blog | Tagged , , , , | Comments Off on Google Infographic on Account Hijackers

Google Firing Range

Google Firing Range is an automated Web Application Security Scanner. Version 0.42, which was released Tuesday checks for Address DOM XSS Redirect XSS Reflected XSS Tag based XSS Escaped XSS Remote inclusion XSS DOM XSS CORS related vulnerabilities Flash Injection … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Google Firing Range

Payment Card Industry – Data Security Standard version 3.0

I’ve been doing some extensive studying for the PCI DSS v 3 and there is a vast improvement on the requirements. There are 6 goals of PCI Remove sensitive authentication data and limit data retention. This milestone targets a key … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Payment Card Industry – Data Security Standard version 3.0

CryptoWall and Dickson County Sheriff’s Office

Sheriff’s department of The Dickson County, Tennessee was attacked by a Ransomware trojan ware that encrypts all of the files on the system and can be decrypted only (HA, yeah right!) if the ransom has been paid for them to … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on CryptoWall and Dickson County Sheriff’s Office