Tag Archives: security

BASH (Bourne-Again SHell) ShellShock Bug

Stephane Chazelas, IT Manager at SeeByte, discovered a vulnerability in bash, related to how environment variables are processed: trailing code in function definitions was executed, independent of the variable name. For those unknowing, Bash is a command processor, typically run … Continue reading

Posted in Security Blog | Tagged , , , , , , , | Comments Off on BASH (Bourne-Again SHell) ShellShock Bug

Home Depot Breach

Home improvement retailer Home Depot confirms its payment security systems fell victim to a massive cyber attack, possibly since April, at nearly 2,200 stores in the U.S. and Canada. Fishnet Security, Symantec, and the Secret Service are working to research … Continue reading

Posted in Security Blog | Tagged , , , , , , , , | Comments Off on Home Depot Breach

Should We Buy Credit Monitoring Services?

With the ton of breaches that have been happening, we use one of the credit monitoring services, after this year though and all the breaches going on, one of the first services that is offered to potential victims, is credit … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , | Comments Off on Should We Buy Credit Monitoring Services?

2014 IBM Cyber Security Intelligence Infographic

Posted in Security Blog | Tagged , , , , , | Comments Off on 2014 IBM Cyber Security Intelligence Infographic

Mid-year 2014 Data Breaches Exposed

2014 is going to replace 2013 as the highest year on record for exposed records, according to Risk Based Security. Mid-year 2014 at a Glance … • There were 1331 incidents reported during the first six months of 2014 exposing … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , , , , | Comments Off on Mid-year 2014 Data Breaches Exposed

The Art of Cyberwar

This was a great presentation at the DefCon 20, tying together CyberWarfare and Sun Tzu’s Art of War.. Sun Tzu was a Chinese military general, strategist, and philosopher. The gentleman presenting is Dr. Kenneth Geers, an NCIS Cyber Subject Matter … Continue reading

Posted in Security Blog | Tagged , , , , | Comments Off on The Art of Cyberwar

Bruce Schneier: The Security Mirage

My CISO brought this up today, so I’m posting it to watch it.

Posted in Security Blog | Tagged , , , , , , | Comments Off on Bruce Schneier: The Security Mirage

Hacker Drones Hacking Drones

I love Hak5.org and their proof of concepts with real world practicality. It’s all fun and games and you get to peer into the hacker mind, where the combining of separate technologies can be turned from prank to cybercrime and … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , | Comments Off on Hacker Drones Hacking Drones

Albert Gonzalez

It’s hard not to be a little envious of the amazing technical skills and charismatic charm of Albert Gonzalez. Then again, I’m glad I haven’t done anything as crazy and super happy to not be serving a 20 year sentence. … Continue reading

Posted in Security Blog | Tagged , , , , , , , , , , , , | Comments Off on Albert Gonzalez

Pablos Holman at TEDxMidwests

This was a fun watch. Nerdy and fun.

Posted in Security Blog | Tagged , , , , , | Comments Off on Pablos Holman at TEDxMidwests