Hackers do not require sophisticated hacking tools or a 65-hour work week. According to an online report dated August 01, 2018, a tech savvy valedictorian from Massachusetts… Read more “Hidden In Plain Sight..”
Cyber Security Blog
The Big Business of Data Privacy: 3B
Who wrote “There’s No Business Like Show Business?” It was Irving Berlin who had written “There’s No Business Like Show Business” for the 1946 musical “Annie Get Your… Read more “The Big Business of Data Privacy: 3B”
10 Minutes of a Supersized DDoS
It only happens to the best of them. If you supersized your order at any restaurant, you are certain to gain more calories for your dollars. If… Read more “10 Minutes of a Supersized DDoS”
Harvesting of Data by Giants!
Heads are nodding, eyebrows are raised and fingers are pointed at Mark Zuckerberg, CEO of Facebook, for an implicit part in data harvesting by Cambridge Analytica. Cambridge… Read more “Harvesting of Data by Giants!”
Reconnaissance Noise
Whether an ethical hacker or unethical hacker, the threat actor seeks information for purposes only s/he understands. Threat actors are continuous learners, expanding skills to select impossible… Read more “Reconnaissance Noise”
What is Dwell Time?
The public is learning more about the dwell time in the cyber-attack against Equifax, and the dwell time may have been longer than first reported. Dwell time… Read more “What is Dwell Time?”
Equifax Breach and the Matrix
Equifax’s website application, one of the three major credit bureaus, was breached. Matrix is a science fiction movie whereby the matrix was fake. Morpheus frees Neo’s… Read more “Equifax Breach and the Matrix”
Memory Leaks
When your computer memory leaks, the result is not catastrophic. Memory leaks are not uncommon. One way to reduce memory leaks is to install the maximum allowable… Read more “Memory Leaks”
Ransomware cost is less than billing!
On April 21, 2017, Moses Afonso Ryan LTD., a law firm in Providence, Rhode Island, sued its insurer, Sentinel Insurance Company, LTD, for $700,000 in lost billings. … Read more “Ransomware cost is less than billing!”
Cyber Kill Chain & Social Media
The Cyber Kill Chain is a signature road map for cyber security professionals, which was developed by Lockheed Martin. The Cyber Kill Chain describes seven sequential steps… Read more “Cyber Kill Chain & Social Media”
Vault 7: CIA Hacking Tools
It had been reported by Wikileaks that the U.S. Central Intelligence Agency (CIA) has several hacking tools to infiltrate IoT devices. The Internet of things (IoT) is… Read more “Vault 7: CIA Hacking Tools”
Chipotle …Malware…Security…
Between March 24, 2017 and April 18, 2017, a malicious malware was downloaded and searched through customer’s credit card data as it was being read from the… Read more “Chipotle …Malware…Security…”
JEDI in the Cloud
On a windy and blistering rainy day, you are expected to feel gloomy? A few lines of codes are demonstrative of statement: def weather (windy, raining): if… Read more “JEDI in the Cloud”
Risk and Incident Response Management
Tomatoes and bananas are not the same as apples and oranges? This is untrue according to the Lexico online dictionary. In fact, true fruits are developed from… Read more “Risk and Incident Response Management”
I am WannaCry, the Cryptoworm!
Updated 1 May 2019 12:28AM Pet Sementary (2019)? Although Horror has many delivery methods such as visceral horror, demon possession, toy monsters or monster toys, apocalypse zombies,… Read more “I am WannaCry, the Cryptoworm!”
Locky is not Us or the Loch Ness Monster?
Chucky is released again in movie theaters. Horror is a lucrative genre if you are a creative writer. Which is fake Chucky, Us or the Loch Ness Monster?… Read more “Locky is not Us or the Loch Ness Monster?”
NotPetya is Scary!
Is the thought of viewing Halloween (2018) terrifying than the thought of a ransomware attack? Assuming the value of horror films and many are acquaintances of Steven… Read more “NotPetya is Scary!”
What’s in your ______?
Samuel L. Jackson, the melodramatic actor and sizable voice of the Atlanta Falcons “Rise Up” campaign, asks, “What’s in your wallet?” Less the boisterous voice and charismatic… Read more “What’s in your ______?”
Let’s Think About Challenges?
It is day 4 of 31 days to exam. I am planning on sitting for Cisco’s Security Fundamentals Exam (e.g., SECFND 210-250 and SECOPS 210-255) at the… Read more “Let’s Think About Challenges?”
Little Noise vs Big Bang
Do you enjoy nature’s most treasured oddities: volcanoes and ice sheets (polar ice caps)? These geological oddities occur without warning like zero day cyberattacks, to some extent. … Read more “Little Noise vs Big Bang”