Monthly Archives: January 2015

HealthCare.gov Includes Health Data in its own URLs

The website, Healthcare.gov leaks data via referer (mispelled accidentally, but stuck) headers. When you visit a website in general, the referer codes tells the new loading site, where you came from. Since healthcare.gov stores information in the referer headers, It’s … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on HealthCare.gov Includes Health Data in its own URLs

Attackers Can Easily Disable 5,300 Gas Stations in the US

The industry’s most famous white hat hacker, HD Moore, reports that automated tank gauges at 5,300 gas stations, can be connected to on port 10,001 without authentication and vulnerable to remote attacks or shut down. There is also publicly hosted … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Attackers Can Easily Disable 5,300 Gas Stations in the US

Is that a Mouse in your Pocket or?

You ready to bring unauthorized hardware on my ‘secure’ network? Mouse-box, the computer in a mouse, is still in prototype. All we know right now is that it is running ChromeOS or Linux. Maybe a variant of Kali will work too. … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Is that a Mouse in your Pocket or?

4.5 Malware Variants a Second

According to German Independent IT Security company AV-TEST, there are 12,000,000 variants of malware a month. That’s about 4.5 every second! Malware, a combination of the words Malicious and Software, can be downloaded or sent to users to click on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on 4.5 Malware Variants a Second

Want Someone’s Password? Just Ask!

Posted in Security Blog | Tagged , , | Comments Off on Want Someone’s Password? Just Ask!

XKCD Comic on Password Strength and Random Words

Use the Four Random English Word Generator!

Posted in Security Blog | Tagged , , , , | Comments Off on XKCD Comic on Password Strength and Random Words

Worst Passwords of 2014

An analysis of the most leaked passwords that were posted online throughout 2014, out of the 3.3 million passwords leaked online, the most common, Top 15 were: 123456 password 12345 12345678 qwerty 1234567890 1234 baseball dragon football 1234567 monkey letmein … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Worst Passwords of 2014

Progressive Insurance’s Snapshot Can be Used to Control Vehicles

2,000,000 vehicles already have the Progressive Snapshot plugged into them via the OnBoardDiagnostic(OBD)-II Port. Digital Bond Labs described at a security conference last week how the Snapshot could be used to hack into some vehicles’ onboard networks. Testing was limited … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Progressive Insurance’s Snapshot Can be Used to Control Vehicles

770,000 Records From One of Australia’s Largest Travel Insurance Companies

Around the number of 770,000 records of personal information consisting of travel insurance clients, names, phone numbers, email addresses, travel dates and prices for policies was stolen around December 18th. Aussie Travel Cover notified 3rd party agents, but did not … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on 770,000 Records From One of Australia’s Largest Travel Insurance Companies

Beware Used or Discount Devices

Because of the introduction of BadUSB, some cybercriminals have been modifying hardware peripherals with some extra storage, some wireless and remote connectivity, and a lot of quality hacker ingenuity. Keyboard with a hardware keylogger built into it This type of … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Beware Used or Discount Devices