Monthly Archives: March 2016

MedStar Health

It’s assumed that MedStar Health is a victim of crypto-ransomware as MedStar forced a shutdown of their email and records database yesterday in order to stop the spread of the malware from encrypting more systems. Most operations went back to … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on MedStar Health

Wireless Mice Leave Corporate Networks Vulnerable To Attack

Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack

Easter Weekend

We celebrated all weekend, starting with Viviana’s birthday, meeting up with some of our family, and then continuing the next day at our house for a small get-together.

Posted in life | Comments Off on Easter Weekend

Verizon Breached. Check!

Creator of the infamous Data Breach Investigations Report has themselves been breached. Contacted about the posting, Verizon Enterprise told KrebsOnSecurity that the company recently identified a security  flaw in its site that permitted hackers to steal customer contact information, and that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Verizon Breached. Check!

9 Whole Years

It’s our anniversary… In a way… Not our marriage anniversary though, but the day we first started seeing each other. I recorded a video a little earlier in the day. I kept it to myself to reveal later. When Jaime … Continue reading

Posted in life | Comments Off on 9 Whole Years

USB Compromise Reveals 22,000 ISIS Identities

A man who names himself Abu Hamed has defected from ISIS and he plausibly stole a USB stick from ISIS security headquarters that contained recruiting questionnaires. The information in the questionnaires contained name, date and place of birth, hometown, telephone … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Compromise Reveals 22,000 ISIS Identities

The First iPhone Hacker Built a Self-Driving Car in his Garage

George Hotz says he built a self-driving car in a month. George was the first person to hack an iPhone and a Playstation. He has a great philosophy on the AI that drives the self-driving car.

Posted in Security Blog | Tagged , , , , , | Comments Off on The First iPhone Hacker Built a Self-Driving Car in his Garage

IRS and Seagate?

The Internal Revenue Service issued an alert on March 1st, 2016, to payroll and human resources professionals to be aware of an emerging phishing email scheme that purports to be from company executives and requests personal information on employees. The … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on IRS and Seagate?

KBB Car Hacking Survey Results

Kelley Blue Book performed a survey that they revealed at RSAC 2016 regarding vehicle vulnerabilities and even though 2015 was the year that the public really started learning about car hacking. Since the last big media news blast, awareness on … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on KBB Car Hacking Survey Results

RSA Conference 2016 – Part 2

To me, some of the fun of the RSA conference is running into Security Celebrities! My personal goal this year was to get some selfies with a few of them. Sometimes I just couldn’t though but was able to snap … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on RSA Conference 2016 – Part 2