Hot Topics
Ashley Madison Data Leak Analysis from Dr. Chaos -

Hackers attacked Ashley Madison (known as AM by its users), the dating site for married couples that promotes. 

1 week ago | 0
HORNET: Encrypted High Speed Anonymous TOR Alternative -

Sectivenet.com posted about Hornet, a high speed alternative to TOR. The original post can be found HERE. Should. 

1 week ago | 0
The Ultimate Guide to the Deep Dark Invisible Web – DarkNet Unleased -

The Web as an Iceberg The Deep Web, DarkNet, The Hidden Net, The Invisible Net: It has many different names. Many. 

2 weeks ago | 0

Ashley Madison Data Leak Analysis from Dr. Chaos

By Aamir Lakhani | On Fri, Aug 21st, 2015 - No Comments »
ashleymadison-580x370

Hackers attacked Ashley Madison (known as AM by its users), the dating site for married couples that promotes infidelity. They walked away with 30 million records containing site user information. While the initial ramifications seem obvious, the story continues to unfold with recent news that email addresses were discovered that originated from government agencies, high level politicians,. 

HORNET: Encrypted High Speed Anonymous TOR Alternative

By Joey Muniz | On Fri, Aug 21st, 2015 - No Comments »
url

Sectivenet.com posted about Hornet, a high speed alternative to TOR. The original post can be found HERE. Should be interesting to see how well this works since TOR is known to be limited with throughput speeds. For many years until now,Tor has been the favorite option to maintain anonymity on the Internet.  Tor was initially developed  by the US Naval Research Lab and works based on ‘onion. 

The Ultimate Guide to the Deep Dark Invisible Web – DarkNet Unleased

By Aamir Lakhani | On Thu, Aug 20th, 2015 - No Comments »
Iceberg

The Web as an Iceberg The Deep Web, DarkNet, The Hidden Net, The Invisible Net: It has many different names. Many experts believe that approximately 30% of the Internet is indexed by searched engines such as Google. If this is true then we can infer that 70% of the content available online is not searchable by Google or other search engines. This remaining content is commonly referred to. 

A problem with the odds and instincts

By Aamir Lakhani | On Mon, Aug 17th, 2015 - No Comments »
goatSecurity

  In times of decision, many of us rely on instinct and gut reaction rather than logic. As humans we actually do a pretty terrible job at understanding and using risk-based approaches in our lives. For example, many people are anxious about flying on an airplane when in reality they should be more scared about the car trip to the airport. We allow inputs from our environment (such as. 

We are data: the future of machine intelligence

By Blog | On Thu, Aug 6th, 2015 - Comments Off on We are data: the future of machine intelligence
Big-Data1

‘The internet is going to do to us whatever it is going to do — and it’s far too late to stop it’ ©Courtesy of The Daniel Faria Gallery, Toronto Prints by Douglas Coupland. Acrylic on archival pigment print I look at apps like Grindr and Tinder and see how they’ve rewritten sex culture — by creating a sexual landscape filled with vast amounts of incredibly graphic site-specific. 

Distributing malware inside Adobe PDF documents

By Aamir Lakhani | On Tue, Aug 4th, 2015 - Comments Off on Distributing malware inside Adobe PDF documents
beer-pitcher

Distributing malware inside Adobe PDF documents is a popular method for attackers to compromise systems. Within the latest versions of Reader, Adobe has added multiple updates to address vulnerabilities. Additionally, Adobe has added a robust software sandbox capability to Reader, which activates if attackers use PDF vulnerabilities to attempt exploit of a system. Due to this sandbox addition,. 

Talos on Phishing: Hook, Line and Sinker: Catching Unsuspecting Users Off Guard

By Joey Muniz | On Wed, Jul 29th, 2015 - Comments Off on Talos on Phishing: Hook, Line and Sinker: Catching Unsuspecting Users Off Guard
phishing-attack

Cisco’s research team Talos wrote a interesting article on their research on Phishing. The original post can be found HERE. For those that don’t know what Phishing is, its the cyber attack where a malicious party pretends to be a legitimate source with the goal to trick a victim into clicking a email, accessing a website, or just giving up sensitive data. Here is the Talos article. . 

Insurance Fraud via Internet of Things

By Blog | On Mon, Jul 27th, 2015 - Comments Off on Insurance Fraud via Internet of Things
59763198_thumbnail

Recently, Beam Technologies announced it would be creating a dental insurance around its connected toothbrushes. Nest also announced it was teaming up with another insurance company, American Family. As a matter of fact, for the better and the worst, this is exactly the kind of connection which is going to raise interest in hacking and/or infecting connected objects. Insurance Fraud. Imagine. 

To Improve Security, Governments Need Accurate, Timely Intelligence

By Blog | On Mon, Jul 27th, 2015 - Comments Off on To Improve Security, Governments Need Accurate, Timely Intelligence
cybersecurity-image

State Tech Magazine posted a great article on Threat Intelligence. Click here for the original article.  State and local agencies have many options for free sources of actionable security information. Effective security starts with accurate intelligence. Unfortunately, agencies short on budget and personnel may often lack timely access to information they can use to better protect their. 

OPM Director Katherine Archuleta Resigns After Massive Personnel Data Hack

By Joey Muniz | On Wed, Jul 22nd, 2015 - Comments Off on OPM Director Katherine Archuleta Resigns After Massive Personnel Data Hack
OfficeHack2

Well it has been a tough time for Katherine Archuleta. With the recent cyber breach and other pressures, she has decided to step down. The Wall Street Journal wrote a great post on this HERE. You can learn more about the breach on datalossdb.org. Below is taken from the Wall Street Journal post. WASHINGTON— Katherine Archuleta, the embattled director of the Office of Personnel Management,.