Tag Archives: hackers

What to Watch To Learn A Little CyberSecurity

Do you like to be entertained? I know I do! Here are some shows and movies that I recommend. Brian Brushwood’s Hacking the System

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on What to Watch To Learn A Little CyberSecurity

Accurate Hacking Scene?

Most accurate hacking scene ever! Don’t you just love some hacking on tv?

Posted in Security Blog | Tagged , , , | Comments Off on Accurate Hacking Scene?

Top 5 CyberThreats of 2016 To Attack or Defend Against

Depending on what color hat you wear, here are the top cyberthreats that most companies face, according to research. 5. Cross Site Scripting or XSS Cross-site scripting (XSS) is a type of computer security vulnerability typically found in web applications. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Top 5 CyberThreats of 2016 To Attack or Defend Against

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

LinkedIn Breach Data Leaked

Back in 2012, LinkedIn lacked some basic security requirements around password security and as a result, they were breached, data was stolen, and LinkedIn and most of the Internet media sites warned users to change their passwords. LinkedIn even enabled two-factor … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on LinkedIn Breach Data Leaked

Social Engineering Fraud Losses Doubled in 2015

Consider the largest breaches of 2015 and realize they weren’t about getting financial data directly. It was all about personal details. Identity theft is a hotter commodity on the dark web, than credit card numbers. Anthem 80 million (Personal Details) Ashley … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Social Engineering Fraud Losses Doubled in 2015

Cyber Monday…. Scammers Are Coming!

As you know, with Cyber Monday coming up and all the online shopping you are all doing, you and everybody you know will be hit in the email and all over your social media with probable scams. Be Aware and … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on Cyber Monday…. Scammers Are Coming!

Bypass Physical Security Using the Help of a Craigslist Job Ad

I spy, with my pi. A job ad was found on craigslist where some bad actors are hiring and paying up to $50/month to anyone who doesn’t adhere to their security policies and is willing to plug in a Raspberry … Continue reading

Posted in Security Blog | Tagged , , , , , | Comments Off on Bypass Physical Security Using the Help of a Craigslist Job Ad

Let the Data Tell Your Story

Big data doesn’t necessarily mean good data. This presentation, created Aug 25 2015, makes us realize that bad guys have the good data and it enables them to keep attacking successfully. (It’s a 47 minutes presentation)

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Let the Data Tell Your Story

Chris Roberts. Plane Hacker

Chris Roberts tweeted what appeared to be a joke about “playing” with a United Airlines plane’s in-flight entertainment and crew-alerting system on April 15. Once he landed, he was questioned by the FBI for several hours. Some of his computer … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on Chris Roberts. Plane Hacker