Tag Archives: hacking

Confessions of a Cyber Spy Hunter

With over 20 years of experience leading high technology companies out of Silicon Valley, Eric has played a part in shaping the industry as an executive at heavyweights like McAfee, Symantec, and Cisco. Today, he is the CEO of ZanttZ, … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , , | Comments Off on Confessions of a Cyber Spy Hunter

Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Is SSA doing enough to make sure YOUR personal information is safe? #cybersecurity #CISO @GOPoversighthttps://t.co/p02togdhHt — Rep. Will Hurd (@HurdOnTheHill) May 26, 2016 Will Hurd, the CyberSecurity professional and Congressman. I can’t get enough of this guy!

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Every CEO, CIO, and CISO Needs to Watch Congressman Will Hurd Talk to the SSA on CyberSecurity

Wireless Mice Leave Corporate Networks Vulnerable To Attack

Wireless mice, the non-bluetooth kind, are a large gaping hole to computer/network security. Yes, not all wireless is bluetooth, matter of fact, Dell, Amazon, HP, and Lenovo sell and ship wireless accessories that aren’t bluetooth; they transmit data unencrypted. With … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Wireless Mice Leave Corporate Networks Vulnerable To Attack

Nissan Leaf API has NO SECURITY

Is it hacking if there is no security by design? If the doors on a bank are unlocked, is it breaking and entering? The API (application program interface) for the Nissan Leaf was found to be vulnerable. How vulnerable? Well, … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Nissan Leaf API has NO SECURITY

Social Engineering Fraud Losses Doubled in 2015

Consider the largest breaches of 2015 and realize they weren’t about getting financial data directly. It was all about personal details. Identity theft is a hotter commodity on the dark web, than credit card numbers. Anthem 80 million (Personal Details) Ashley … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Social Engineering Fraud Losses Doubled in 2015

USB Killer… 2.0!

Do you remember, back in March, when I wrote about using a USB key that could fry a computer and actually make it catch on fire? Well, it’s been improved upon, version 2.0 was created. It works super fast as … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on USB Killer… 2.0!

Vehicle Automation Susceptible to DoS Attacks

Self driving cars are pretty darn cool, but so are cybersecurity attacks against them. Like stopping them in their tracks with a laser pointer. No kidding! Security researcher, Dr. Jonathan Petit, (English version of little john… lol) points out the … Continue reading

Posted in Security Blog | Tagged , , , , , , | Comments Off on Vehicle Automation Susceptible to DoS Attacks

Infographic on Ethical Hacking

Found on Trustwave‘s site.

Posted in Security Blog | Tagged , , , , | Comments Off on Infographic on Ethical Hacking

Personnel Data and Social Security Numbers for EVERY Federal Employee STOLEN

It was announced last week that hackers stole Social Security Numbers, military records and veterans’ status information, address, birth date, job and pay history, health insurance, life insurance, and pension information (age, gender, race data) when they breached the Office … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , | Comments Off on Personnel Data and Social Security Numbers for EVERY Federal Employee STOLEN

A Car is a Computer with Wheels

Your car is totally hackable. See more posts on Car Hacking

Posted in Security Blog | Tagged , , , , , , | Comments Off on A Car is a Computer with Wheels