Daily Archives: January 6, 2015

Is 2015 Going to be Similar to 2014 in Breaches?

On January 2nd, Chick-fil-A released a statement in regards to the security breach they found out about on December 19th, 2014. One unnamed financial institution said it received an alert that contained “nearly 9,000 customer cards” for a breach that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Is 2015 Going to be Similar to 2014 in Breaches?

An Intro To Recon-ng Pushpin

Recon-ng is a full-featured Web Reconnaissance framework written in Python. Complete with independent modules, database interaction, built in convenience functions, interactive help, and command completion, Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on An Intro To Recon-ng Pushpin

Protecting Personal Information

Secure your accounts: Ask for protection beyond passwords. Many account providers now offer additional ways for you verify who you are before you conduct business on that site. Make passwords long and strong: Combine capital and lowercase letters with numbers … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Protecting Personal Information