Monthly Archives: January 2015

Stupidest Movie Hacks

Dorkly had this posted, it’s worth a good chuckle!

Posted in Security Blog | Tagged , , | Comments Off on Stupidest Movie Hacks

BMW Vulnerable to Remote Unlock

Update your BMW’s internal software and your smartphone app as soon as possible, the patch should deploy automatically by January 31st, but there is a chance your vehicle didn’t get the patch if you parked underground. The affected version of … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on BMW Vulnerable to Remote Unlock

Spear Phishing

Cyber thieves stole nearly $215 million from businesses in the last 14 months using email scams. Once a high level exec has his or her email compromised, the bad guys lurk, learn the schedules, learn the business, learn the business … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Spear Phishing

Data Privacy Day: 2015

Every January 28th, is Data Privacy Day. A good reminder to police yourself and clean up your digital footprint you left on the Internet. The 2nd Annual Report on How Personal Technology is Changing Our Lives, reports that Privacy is … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Data Privacy Day: 2015

DOE Grants $25 Million for Cybersecurity Education

The Department of Energy announced it will provide $25 million in funding over the next five years to support cybersecurity education at more than a dozen Historically Black Colleges and Universities. As highlighted by the President earlier a couple weeks … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on DOE Grants $25 Million for Cybersecurity Education

Doxing

Here are some doxing tutorials.

Posted in Security Blog | Tagged , , , , | Comments Off on Doxing

Under 11 Minutes to Crack WiFi for 7 Year Old

Seven-year-old Betsy Davis, using only youtube videos for knowledge, was able to find out how to hack the controlled environment’s public WiFi. She set up a rogue access point for a Man-in-the-Middle (MitM) attack, which allowed her to steal data … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Under 11 Minutes to Crack WiFi for 7 Year Old

Cisco’s 2015 Security Report

Cisco said Java represented a whopping 91 percent of all indicators of compromise, the best way to combat it? With some good old fashioned Security Awareness. Cisco’s 2015 annual security report,  was released last week. As part of its report, … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Cisco’s 2015 Security Report

Ghost to the Shell

During a code audit, researchers at Qualys discovered a buffer overflow in the __nss_hostname_digits_dots() function of glibc which can get access to the shell. The GHOST vulnerability is a serious weakness in the Linux glibc library. It allows attackers to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Ghost to the Shell

Game of Hacks

Test your application hacking skills! You will be presented with vulnerable pieces of code and you must find which vulnerability exists in that code as quickly as possible. You can also submit questions.

Posted in Security Blog | Tagged , , , , , | Comments Off on Game of Hacks