Dynamic Host Configuration Protocol (DHCP) is a network management protocol, running at the application layer and providing an Internet Protocol (IP) host (client) with its IP address,… Read more “When a Rouge DHCP is Active?”
Category: Cybersecurity
Cyberthreat Real-Time Maps
Updated: 26 December 2017 How many cyber attacks occur each day around the globe? The number is astronomical, and cyber attacks are not showing signs of slowing. One… Read more “Cyberthreat Real-Time Maps”
Twists and Turns of Pen Testing: Part I of III
Learning to swim is synonymous with learning to use pen testing in cyber security management. The first step in learning to swim is to identify your goal. Two crucial goals of penetration testing is to reduce loss of data and loss of profits.
Phishing for Big Dollars….
After the final phase of the Cyber Kill Chain has been completed, phishing techniques are recycled. Phishing is a form of social engineering that manipulates an individual… Read more “Phishing for Big Dollars….”
Government Contractor, 65 Years Old, Arrested Under Official Secrets Act of 1911
Recently, a 65 year old female government contractor was arrested and charged with an offense under the Official Secrets Act of 1911. Her arrest was the result… Read more “Government Contractor, 65 Years Old, Arrested Under Official Secrets Act of 1911”
540,000 Vehicle Identification Numbers Leaked
Personal credit hacked! Vehicle tracking login credentials leaked! Bits and bytes of data on servers have one caveat-100 percent secure? There are human errors that contribute to… Read more “540,000 Vehicle Identification Numbers Leaked”
Vevo says, “Hit the Road Jack!”
Earlier this month, OurMine leaked 3.12 Terabytes (TB) of Vevo’s internal data. Should you or should you not pay threat actors? OurMine, hackers group, gingerly enjoined, “We… Read more “Vevo says, “Hit the Road Jack!””
What is Dwell Time?
The public is learning more about the dwell time in the cyber-attack against Equifax, and the dwell time may have been longer than first reported. Dwell time… Read more “What is Dwell Time?”
Equifax Breach and the Matrix
Equifax’s website application, one of the three major credit bureaus, was breached. Matrix is a science fiction movie whereby the matrix was fake. Morpheus frees Neo’s… Read more “Equifax Breach and the Matrix”
Memory Leaks
When your computer memory leaks, the result is not catastrophic. Memory leaks are not uncommon. One way to reduce memory leaks is to install the maximum allowable… Read more “Memory Leaks”