Search Results for: social engineering

The Lovely Mia Ash

Have you ever seen that spam on Facebook where someone posts, if you see a friend request from so-and-so, don’t accept it, it’s a hacker! Yeah, this post is ‘kind-of‘ like that. Well, Mia Ash is a whole online persona … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on The Lovely Mia Ash

2016 San Francisco CISO Executive Summit

I had the privilege of attending the 2016 CISO Executive Summit in San Francisco on Monday the 5th. I went with a great group of people! There was a lot of good discussions regarding leadership, insider threats, third party management, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on 2016 San Francisco CISO Executive Summit

What to Watch To Learn A Little CyberSecurity

Do you like to be entertained? I know I do! Here are some shows and movies that I recommend. Brian Brushwood’s Hacking the System

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on What to Watch To Learn A Little CyberSecurity

Top 5 CyberThreats of 2016 To Attack or Defend Against

Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against

Verizon Breached. Check!

Creator of the infamous Data Breach Investigations Report has themselves been breached. Contacted about the posting, Verizon Enterprise told KrebsOnSecurity that the company recently identified a security  flaw in its site that permitted hackers to steal customer contact information, and that … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Verizon Breached. Check!

This Guy Asks Hackers to Ruin His Life!

An eye-opening video about the capability of hack attacks, from social engineering to complete digital-life and real life takeover. Not only is the journalist asking people to do it, experts blatantly show how they do it. Please take the time … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on This Guy Asks Hackers to Ruin His Life!

Valid Apple Employee Logins Worth Up To $23,000

At the Apple headquarters of Cork, Ireland, low hanging fruit employees are being offered to sell their logins online, for up to $23,000 US. Easy Pickings! An employee login is very valuable, allowing for legitimate authentication to internal systems can … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Valid Apple Employee Logins Worth Up To $23,000

Scottrade Breach

“Cybercriminals had unauthorized access to our network for a period of several months between late 2013 and early 2014” According to a Cyber Security Alert page on Scottrade, Federal investigators found indicators that prove Scottrade’s network and systems was used. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Scottrade Breach

Security Awareness Memes

Posted in Security Blog | Tagged , , , | Comments Off on Security Awareness Memes

Business Email Compromise Leads to $737,000 Transfer to China

The FBI classifies “phishing that leads to loss” as Business Email Compromise (BEC). In a recently released story that closely matches the BEC hack in Omaha I wrote about back in February, another company fell victim to a spearphishing attack … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Business Email Compromise Leads to $737,000 Transfer to China