Passwords are categorized on how easy they are to break. Weak passwords are short in length, recognizable keyboard patterns, common dictionary words, names of people and frequently… Read more “Brute Force Attack”
Category: Cybersecurity
Single Identity Manager Hacked: OneLogin
Bitcoins, ransomware, and climate change have one thing in common: heat. Cyber-attacks have risen and many targets are unable to delivery on the promise of “protection” and… Read more “Single Identity Manager Hacked: OneLogin”
Cyber Kill Chain & Social Media
The Cyber Kill Chain is a signature road map for cyber security professionals, which was developed by Lockheed Martin. The Cyber Kill Chain describes seven sequential steps… Read more “Cyber Kill Chain & Social Media”
Wireless Cracking
The term wireless network is a combination of broadband ( internet provider ) devices and wireless (access points and nodes) connections. The marriage creates the Wireless Local… Read more “Wireless Cracking”
Police Plans to Hire Teen Hacker
A team of Indonesia teen hackers called Gangtengers Crew had stolen $4.1B Rp (USD $300,000) of airline tickets from various websites. It is estimated the teens hacked… Read more “Police Plans to Hire Teen Hacker”
Ares Cyber Security Blog
What’s in a name? Ares in Greek mythology is the Olympian God of battlelust, courage and war. Battlelust identifies a strong readiness for battle. Courage is bravery… Read more “Ares Cyber Security Blog”
Chipotle …Malware…Security…
Between March 24, 2017 and April 18, 2017, a malicious malware was downloaded and searched through customer’s credit card data as it was being read from the… Read more “Chipotle …Malware…Security…”
Cybersecurity Truths
Cybersecurity attacks happen so frequently that the goal of the computer security incident response team (CSIRT) is to recreate attacks, when applicable, to mitigate future cyber attacks.… Read more “Cybersecurity Truths”