Tag Archives: hackers

Hackers Movie: Matthew Lillard

In 1995, the movie Hackers, came out and I was already interested in computers and knew that I would make that my career when I got out of the Marine Corps. My computer interest turned into a job in information … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Hackers Movie: Matthew Lillard

Blackhat & DefCon

So I just got back from 2 back-to-back conferences in Las Vegas and wow, am I tired! I got to spend a lot of quality time with coworkers and talking to vendors and other like-minded nerds and geeks.    

Posted in Security Blog, Vegas | Tagged , , , , , , , , | Comments Off on Blackhat & DefCon

Internet Hacker: John Hammond

At Blackhat, I ran into John Hammond, and if you haven’t seen his Youtube Channel, you’re missing out. He goes into some hacker tools and displays his prowess over Linux and other operating systems. It’s pretty impressive.

Posted in Security Blog, Vegas | Tagged , , , , , | Comments Off on Internet Hacker: John Hammond

Black Hat & Def Con 2022

I have my first opportunity ever to attend Black Hat and DefCon in Las Vegas. I got to rub elbows with others and meet with my co-workers, and also reconnect with some of my peers. It was an experience I … Continue reading

Posted in Security Blog, Vegas, Work | Tagged , , , | Comments Off on Black Hat & Def Con 2022

Stock Photo Hackers

Posted in Security Blog | Tagged , , | Comments Off on Stock Photo Hackers

Brilliant Video Showing The Anatomy of An Attack

Cisco made a great video (4 minutes) that I honestly think everyone must see. It breaks down a complex ransomware attack. Picture this happening to your organization. Are you ready for it?

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Brilliant Video Showing The Anatomy of An Attack

Dyn Down by DDoS

Dyn a company that provides dynamic domain name resolution (convert names into IP addresses) was threatened to shell out some bitcoin or else… Or else what? I’d like to call it an availability compromise, but in layman’s terms, an outage … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , , | Comments Off on Dyn Down by DDoS

Tech Support Scam Infographic

Here is a cool infographic that Microsoft created. I love infographics with numbers in them. 50% of Millennials are normally scammed. 34% are about my age. 17% are old… like my boss at work :)

Posted in Security Blog | Tagged , , , , , , , , , , , , , , | Comments Off on Tech Support Scam Infographic

Ransomware and the IoT

During a security conference, a gentleman demonstrated a thermostat that he compromised, lock out the user for a ransom. He was even able to make the thermostat emit a tone only animals can hear. Imagine your dogs or cats freaking … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Ransomware and the IoT

When October is NCSAM, but Also Halloween!

Posted in Security Blog | Tagged , , , | Comments Off on When October is NCSAM, but Also Halloween!