Posts Tagged ‘ infosec ’

I hope none of you use JP Morgan Chase

October 3, 2014

#InfoSec   Embedded Link JP Morgan Chase hacking attack :: DTIS JPMorgan Chase & Co. says that this summer’s cyberattack affected 76 million households and seven million small businesses. Customer information including names, addresses, phone numbers and email addresses could have been ‘compromised’, according to a document sent to the Securities and … View this […]

Tags:
Posted in Google+ | No Comments »

Possible credit card breach at Home Depot

September 3, 2014
Possible credit card breach at Home Depot

 It is believed that this breach could be many times larger than Target, which had 40 million credit and debit cards stolen over a three-week period. #InfoSec   Credit Card Breach at Home Depot :: DTIS Multiple banks say they are seeing evidence that Home Depot stores may be the source of a massive new batch […]

Tags:
Posted in Google+ | No Comments »

Can you trust your USB devices?

August 4, 2014
Can you trust your USB devices?

An article claims that we could be headed to a reality where you can’t trust your USB devices.  Not just storage devices, but any USB device could potentially get infected with malware. #InfoSec   “BadUSB” – what if you could never trust a USB device again? Imagine if you had to throw away your USB […]

Tags:
Posted in Google+ | No Comments »

Blackphone, a secure smartphone

June 30, 2014
Blackphone, a secure smartphone

Based on the Android mobile OS, Blackphone offers a secure operating system paired with key applications to provide a secure environment for phone calls, texts, and file storage. According to the review, it appears to function well enough as designed for a secure device but not so much if you expect to use it as […]

Tags: ,
Posted in Google+ | No Comments »

They don't want to take compromising or sexual photos of you, they want something…

June 27, 2014
They don't want to take compromising or sexual photos of you, they want something…

They don't want to take compromising or sexual photos of you, they want something scarier. Researchers have developed an algorithm to detect the PIN being entered on your mobile device based on shadows from up to 100 feet away. One interesting solution which attempts to make such a system useless, is a keyboard app that […]

Tags: ,
Posted in Google+ | No Comments »

IPMI and BMC vulnerabilities put thousands of servers at risk

June 23, 2014
IPMI and BMC vulnerabilities put thousands of servers at risk

Multiple vulnerabilities in the IPMI protocol and the baseboard management controllers designed to allow remote, hardware level access to servers, could allow an attacker to take control of a server. Administrators are encouraged to restrict IPMI access so that the interface cannot be reached from the internet. http://threatpost.com/ipmi-protocol-bmc-vulnerabilities-expose-thousands-of-servers-to-attack #infoSec   IPMI Vulnerabilities on BMCs expose […]

Tags:
Posted in Google+ | No Comments »

Privacy improvements in iOS8

June 10, 2014
Privacy improvements in iOS8

Apple is introducing a number of privacy-protection enhancements in it's upcoming mobile device operating system.  The most notably is perhaps the use of random MAC addresses when scanning for WiFi networks, which previously could have been used to uniquely track a device.  Advertisers have proposed using such systems to offer targeted advertising by tracking a […]

Tags: , , ,
Posted in Google+ | No Comments »

Comcast wants to share your WiFi

June 10, 2014
Comcast wants to share your WiFi

Comcast has been slowly enabling public WiFi access in their home routers across the country, allowing other users to connect to the internet via your service if you have one of the new routers that support it.  This month (starting this week) it's being turned on in Houston. The public network will be segregated so […]

Tags: , , ,
Posted in Google+ | No Comments »

Ransomware on the rise

June 6, 2014
Ransomware on the rise

These "Ransomware" attacks will render all the files on your hard drive(s) and accessible network storage useless.  The typical infection will state, that for a fee, your files will be decrypted so you can access them again – but chances of that happening successfully are unlikely.  Plus they are actively being reported and shut down […]

Tags:
Posted in Google+ | 1 Comment »

OpenSSL releases security advisory

June 6, 2014

OpenSSL has released updates patching 6 vulnerabilities, which may allow an attacker to decrypt or modify traffic between a vulnerable client and server. The following updates are available: OpenSSL 0.9.8 SSL/TLS users should upgrade to 0.9.8zaOpenSSL 1.0.0 SSL/TLS users should upgrade to 1.0.0mOpenSSL 1.0.1 SSL/TLS users should upgrade to 1.0.1h #InfoSec? Embedded Link OpenSSL Security […]

Tags:
Posted in Google+ | No Comments »

Switch to our mobile site