Monthly Archives: May 2015

Starbucks Customers Targeted

Starbucks customers have been targeted and money is being syphoned from the credit or debit card they have tied to their Starbucks accounts… Why would you even do this? No idea. But when you go for convenience, you usually sacrifice … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Starbucks Customers Targeted

Virtual Environment Neglected Operations Manipulation: VENOM

“Virtual Environment Neglected Operations Manipulation” or Venom, is a new vulnerability that could allow a hacker to infiltrate potentially every machine on a data center’s network, leaving millions of virtual machines vulnerable to attack, if they run QEMU… Venom can … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Virtual Environment Neglected Operations Manipulation: VENOM

Microsoft Patching

Historically, updates to fix security are called patches because back in the day when we used punch cards to program stuff, if we did something wrong, we would affix paper patches over the holes in the punch cards. True story! … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on Microsoft Patching

Wells Fargo Credit Cards

In order to meet tough sales quotas and unrealistic goals, credit accounts are (allegedly) being opened by Wells Fargo employees, according to the civil complaint filed by the Los Angeles City Attorney. The fraud complaint charges state that in order … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Wells Fargo Credit Cards

USBKill Switch Engaged

USBKill is a kill-switch that waits for a change on your USB ports (such as removing the usb) and then immediately shuts down your computer and is available on GitHub. USBKill should be paired with full disk encryption for maximum … Continue reading

Posted in Security Blog | Tagged , | Comments Off on USBKill Switch Engaged

Password Complexity Vs. Length

As you can see, after adding several characters, it takes a password cracker seconds to millions of millennia to crack a password.

Posted in Security Blog | Tagged | Comments Off on Password Complexity Vs. Length

May the Fourth: Star Wars Day

This has always bothered me.

Posted in Security Blog | Tagged , , , | Comments Off on May the Fourth: Star Wars Day

World War II Encryption

Visit TheDarkLand

Posted in Security Blog | Tagged | Comments Off on World War II Encryption

Schools Hacked

The University of California Berkeley school was hit with a data breach that might have exposed students’ Social Security numbers. The data held in the breached computer included Names, Social Security, and bank account numbers. The breach affected about 260 … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Schools Hacked

Hard Rock Hotel & Casino

If you visited a restaurant, bar, or retail outlet at a Hard Rock Hotel or Casino between September 3rd, 2014 and April 2nd, 2015 in Las Vegas, and don’t have credit monitoring set up, please check your statements and/or sign … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Hard Rock Hotel & Casino