Monthly Archives: April 2015

Seven Deadly Employee Sins – How Companies Get Compromised

The average person thinks that companies get hacked by super hackers with amazing knowledge on computer systems and can break encryption by staring at jumbled code like John Forbes Nash Jr. in the movie, A Beautiful Mind. It may be … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Seven Deadly Employee Sins – How Companies Get Compromised

General David Petraeus

General David Petraeus was sentenced to serve two years on probation and to pay an $100,000 fine on Thursday for sharing classified information with his biographer and lover, Paula Broadwell. Petraeus pled guilty to one federal charge for giving 5-by-8 … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on General David Petraeus

Data Breach Bills to Protect Consumers from Hackers and CyberCriminals

Last Tuesday, two new bipartisan senate bills was proposed to increase notification and create/enhance information sharing by Senators Mark Kirk (R) and Kirsten Gillibrand (D) where introduced to congress. The following is what was transcribed. By Mr. KIRK (for himself … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Data Breach Bills to Protect Consumers from Hackers and CyberCriminals

RSA Conference 2015

I just got back from the RSA Conference at the Moscone center this week with a full pass. It’s my first time and this place is unbelievably packed! The moscone center is huge! The after parties are the places to be, … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on RSA Conference 2015

Bill & Ted’s Deep Web Explained

Written by Alex Winters (Bill S. Preston, Esquire) and Narrated by Keanu Reeves (‘Ted’ Theodore Logan) as a trailer for Deep Web, The Movie, the following trailer goes deeper into the movie, but how far down the rabbit hole will … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Bill & Ted’s Deep Web Explained

Social Engineering Fraud Videos

Though this is an advertisement for consulting services (at the very end), this video has two great examples of how fraud is committed through social engineering. Here is a talk from a DerbyCon that Jamison gives a full presentation on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Social Engineering Fraud Videos

Five Habits to be Unhackable

By simply adopting these five habits of practically unhackable people, you too can have better security. Think before you click. 95% of hacks are the result of clicking bad links, so make sure to check that it’s the right URL and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Five Habits to be Unhackable

Single and Vulnerable… By the Millions

Visitors and members of Match.com are vulnerable to plaintext sniffing from a man-in-the-middle attack. Their https, redirects to http then logins are passed in the clear. Completely readable to those on the same network. Read more here.

Posted in Security Blog | Tagged , , , , | Comments Off on Single and Vulnerable… By the Millions

Jackpot! Of Sorts…

The information security director, Mr.Eddie Raymond Tipton, from a Multi-State lottery Association in Iowa, decided that it was his turn to win the United States jackpot. He has been arrested and is being tried for forgery and hacking the lottery … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Jackpot! Of Sorts…

ISIS Hackers or Incompetent Password Management?

11 television stations went off the air; websites and social media were defaced; and an internal IT outage for TV5 in Paris, France. The websites were taken over with pro-messages of the CyberCaliphate, the same group who either DDoS’ed or defaced … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on ISIS Hackers or Incompetent Password Management?