I have been meaning to write this blog for a while, as I have regurgitated this information on multiple occasions on the Cisco Learning Network. I recently read Brandon Carroll’s blog post comparing VIRL and GNS3, with some excellent bullet points on how to decide what is right for you. Brandon’s post does assume a bit of understanding of the underlying technologies used.
Do Government Partnerships with Private Organizations Make Sense in Cyber Security? Recent cyber-attacks such as JP Morgan Chase, Sony Entertainment, Home Depot, and Target not only caught the attention of the media and public bringing into light how fragile the systems that guard our data is, but also caught the attention of the US Government where they played a direct role in investigating.
Virtual firewall instances within a single hardware appliance have been a hot topic for a few years now, enabling customers to do more with less hardware. This has never been more true then now, especially within multi-tenant environments and constantly evolving security regulations surrounding PCI, HIPAA, NERC, etc. Fortinet calls these virtual firewalls Virtual Domains, Cisco calls them.
My good friend, partner in crime, and co-author Joseph Muniz (who you may know as The Security Blogger) and I are very proud to present our second book … “Penetration Testing With Raspberry Pi“. This book can be found on Packt’s website HERE and should start being seen on most online stores such as Amazon, Barns and Noble the next few days. Our first book talked about web penetration.
Raul Alvarez unwraps the many layers of an increasingly prevalent banking trojan. Banking trojans remain one of the most prevalent kinds of malware. Among them, trojans based on Zeus have long been the most prevalent, but in recent months a relatively new trojan has been challenging the reign of Zeus: Vawtrak. Also known as Neverquest or Snifula, Vawtrak initially targeted users of Japanese.
In light of all the cyberattacks that have been well publicized as of late, we see the increasing need for skilled IT security resources to both protect against and respond to rapidly evolving cyber-threats. IT professionals tasked with protecting their companies’ cyber assets are facing growing challenges: Cyber threats are getting more advanced; Networks are getting more complex leading.
If you are seeing “Your personal files are encrypted” message – you are in a big trouble! Ransomware is a category that includes infections that block or encrypt the files on users’ computers, and ask for a payment to be made in order for users to be able to retake control over their files. In the case of CBT-Locker (Critoni) Ransomware, you will be presented with a message placed.
President Obama just unveiled a number of proposals to crack down on hackers. It’s great that the government is working on this but we need to do a better job of protecting ourselves. So we sent a camera out onto Hollywood Boulevard to help people by asking them to tell us their password.
Warning: The ideas, concepts and opinions expressed in this blog are intended to be used for educational purposes only. The misuse of the information from this article can result in criminal charges brought against the persons in question. Refer to the laws in your province/country before accessing, using,or in any other way utilizing these materials. One of the most popular malware.
Spoiler warning: This article contains plot details from Blackhat the movie (2015). It is hard not to root for Michael Mann. He gave us The Last of the Mohicans and Heat. The Insider and Ali held their own, and I can’t say I didn’t enjoy Collateral. Then things started to get a little strange with Miami Vice, and Public Enemies. One of the most visually stunning directors opts for grittiness.