Hot Topics
Drone Warfare -

I think we are all aware of how warfare really works and how the military-industrial complex does very nicely here. 

3 days ago | 1
Why You Need an SSL Certificate -

  You can count on a Secure Sockets Layer Certificate to protect your website and customers from security. 

5 days ago | 1
Shellter Project – bypassing AV Detection -

Shellter is found at the website www.shellterproject.com and is a shellcode injector. I have been using the tool. 

5 days ago | 0

Top 10 Security Blunders Your Employees Make That Open You Up to a Data Breach

By Blog | On Fri, Feb 5th, 2016 - No Comments »
Top-10-yellow-Logo

  As a security professional, I frequently find myself cringing at dozens of little things that employees do every day. I say things like: “Don’t click on that,” or “Your Adobe Flash is way out of date and full of serious security issues.” When an employee makes a security slip-up, they can instantly set your entire organization up for a painful and damaging data breach. While. 

Drone Warfare

By Keith Rayle | On Thu, Feb 4th, 2016 - 1 Comment on Drone Warfare
drone-keith-2

I think we are all aware of how warfare really works and how the military-industrial complex does very nicely here in America. It’s the age-old story of: I have a gun Yah, but I have a bigger gun. Oh yah? I have a bullet proof vest. Oh yah? I have a 100 kiloton nuclear device. And so forth. It’s the same cyclical model with any warfare, to include information protection. Malware detection. 

Why You Need an SSL Certificate

By Blog | On Tue, Feb 2nd, 2016 - 1 Comment on Why You Need an SSL Certificate
ssl-certificate-gurantee

  You can count on a Secure Sockets Layer Certificate to protect your website and customers from security threats. This technology will make sure that your site and private information is protected. There are a variety of different SSL Certificates out there. You want to choose the best one for your specific needs that will authenticate your site to browsers and customers. When people. 

Shellter Project – bypassing AV Detection

By Aamir Lakhani | On Tue, Feb 2nd, 2016 - No Comments »
shellter spash screen

Shellter is found at the website www.shellterproject.com and is a shellcode injector. I have been using the tool to demonstrate to customers how simple it is to bypass antivirus (AV) detection using programs that would have otherwise been detected as suspicious or possible threats within typical from AV analysis engines. The Good Shellter is a dynamic program executable (or PE) infector.. 

An Easy Way for Hackers to Remotely Burn Industrial Motors

By Joey Muniz | On Fri, Jan 29th, 2016 - No Comments »
mustang mid air

Wired posted a interesting article on another car hack. This relates back to the concern of  securing the internet of things meaning protecting anything with a IP address. Using https://www.shodan.io/ and searching for sensitive systems that should not be accessible online shows us that this is still not the case. The original post can be found HERE.  

Wendy’s Looks for Possible Security Breach After Credit Card Fraud

By Joey Muniz | On Fri, Jan 29th, 2016 - No Comments »
wen2

krebsonsecurity posted HERE about how Wendy’s believes they have had a credit card breach and unsure if the incident has been contained. Wendy’s, the nationwide chain of fast-food restaurants, says it is investigating claims of a possible credit card breach at some locations. The acknowledgment comes in response to questions from KrebsOnSecurity about banking industry sources who discovered. 

IoT Device Hack

By Aamir Lakhani | On Fri, Jan 29th, 2016 - No Comments »
IoT Hacking

Wi-Fi Enabled Video Doorbells, allows users to monitor your doors from your smartphone or tablet! Using push notification, it chimes on all of your connected devices when you have a visitor. You can monitor your doors from upstairs or across the world. Multiple sensors, night vision, and motion detection make it a great tool. I first discovered this vulnerability in early November. The manufacture. 

Data Privacy and Cars

By Keith Rayle | On Wed, Jan 27th, 2016 - No Comments »
mustang mid air

I tend to get a pretty decent discount from my car rental agency. I travel quite a bit and have focused on one rental agency, so I have built status and am very happy about the overall consumer experience. A couple of months back I was perusing the available vehicles for the $28/day rate, and low and behold….a yellow Mustang was sitting there, just waiting for me to grab it up. Which, incidentally,. 

Hungarian Government Guilty of Snooping On Its Citizens

By Blog | On Tue, Jan 26th, 2016 - No Comments »
1984 spying

In many ways, security awareness training exemplifies the way information security is seen and tackled by senior management. A once-a-year, classroom-based approach may be traditional, with security updates and warnings posted on walls and the Intranet, but it is also a sign of a tick-box, compliance-driven approach to security. It is often done to appease industry regulators, PCI and data. 

Dr. Chaos Security Podcast – Episode “Pilot”

By Aamir Lakhani | On Tue, Jan 26th, 2016 - No Comments »
podcaster_full

Episode: Pilot 2016-01-18 Security Reports and Predications for 2016 The pilot episode for the first ever broadcast is here. This is just an experiment (consider it a pilot). My guest and co-host, Anthony Giandomenico, a security expert with over 18 years of experience,  joins me in discussing security threat reports and predications from major vendors.  A quick shout to The Security.