Monthly Archives: September 2015

Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers

The Turla APT group (we think), who are responsible for the Epic Turla cyber-espionage operation, pushing malware to hundreds of computers in more than 45 countries, have hijacked downstream links from satellites to hide their command and control servers. The … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Hijacked Satellite (Download Links) used to Steal Data From Thousands of Computers

Mars Rover Susceptible to Integer Overflow Vulnerability

The Mars Rover has parts that run on VxWorks, and with that, bring some vulnerabilities. The Integer Overflow vulnerability was in the OS which allows targeting a specific part of the operating system and write to memory on the machine running. … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on Mars Rover Susceptible to Integer Overflow Vulnerability

Vehicle Automation Susceptible to DoS Attacks

Self driving cars are pretty darn cool, but so are cybersecurity attacks against them. Like stopping them in their tracks with a laser pointer. No kidding! Security researcher, Dr. Jonathan Petit, (English version of little john… lol) points out the … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Vehicle Automation Susceptible to DoS Attacks

1st Half of 2015’s Data Breaches – Infographic

Here are some awesomely shocking numbers related to data breaches of 2015s 1st half of the year. Get the report here.

Posted in Security Blog | Tagged , , , , | Comments Off on 1st Half of 2015’s Data Breaches – Infographic

Infographic on Ethical Hacking

Found on Trustwave‘s site.

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic on Ethical Hacking

You Won’t Believe What Makes This Beautiful Pattern Underwater!!!

The image in the title was created by the pufferfish, but more importantly, this is how some people try to get you to click on links. It’s called Click-Baiting. A cool picture, maybe some cool information you might not know, … Continue reading

Posted in Security Blog | Tagged , , | Comments Off on You Won’t Believe What Makes This Beautiful Pattern Underwater!!!

Here’s Why Physical Security Walkthroughs Are a Great Test

If you act like you belong, it’s not often you get questioned about your actions. This has been proven time and time again at many places with a lot of turnaround. This has especially worked well for a recent Walmart … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Here’s Why Physical Security Walkthroughs Are a Great Test

Security Awareness Training Evolution

The lesson here, is that you shouldn’t make security awareness training; dull, boring, and strictly compliance based. Keep it: Fun Fresh Measurable

Posted in Security Blog | Tagged , , | Comments Off on Security Awareness Training Evolution

New Android Ransomware from the NSA?

There is new ransomware floating around that encrypts the contents of Android phones called Simlocker. It pretends to be from the NSA, uses XMPP (Extensible Messaging and Presence Protocol) and is hard to detect with anti-malware tools. Check Point’s malware … Continue reading

Posted in Security Blog | Tagged , , , | Comments Off on New Android Ransomware from the NSA?