My Security Thoughts by @mhbjr

My Security Thoughts by @mhbjr

my current thoughts are on how cyber security is affected or will be affected by the automation and religion
Jan 29, 2015 | 0 comments | View Post
A Cyber-Security Summary of the President’s State of the Union Address

A Cyber-Security Summary of the President’s State of the Union Address

A Cyber-Security Summary of the President’s State of the Union Address
Jan 21, 2015 | 2 comments | View Post
Complementing a Security Management Model with the 20 Critical Security Controls

Complementing a Security Management Model with the 20 Critical Security Controls

Complementing a Security Management Model with the 20 Critical Security Controls
Dec 23, 2014 | 1 comment | View Post
Former Anonymous hacker doubts North Korea behind Sony attack

Former Anonymous hacker doubts North Korea behind Sony attack

Former Anonymous hacker doubts North Korea behind Sony attack
Dec 21, 2014 | 0 comments | View Post
NSA sets date for purge of surveillance phone records

NSA sets date for purge of surveillance phone records

A posting from NakedSecurity titled “NSA sets date for purge of surveillance phone records ” by  Lisa Vaas  The National Security Agency (NSA) has set a date to purge phone records collected during its bulk surveillance program. “Analytic access” to the five years worth of records will end on 29 November, and they’ll be destroyed […]

Code Theft: Protecting IP At The Source

Code Theft: Protecting IP At The Source

An interesting article from DarkReading titled “Code Theft: Protecting IP At The Source” by Anna Chiang.   Your corporate assets are at risk and every day that you avoid taking action shortens the time until your IP will be leaked. Here are six steps toward better data security. The security world is awash with various malware-centric cyber […]

Online Security: How The Experts Keep Safe

Online Security: How The Experts Keep Safe

An interning article titled “Online Security: How The Experts Keep Safe” from information week by Thomas Claburn. In the 1976 thriller Marathon Man, Nazi war criminal Dr. Christian Szell tortures runner “Babe” Levy to find out whether it’s safe for him to retrieve diamonds stored in a bank deposit box. “Is it safe?” Szell asks repeatedly. Levy, […]

iPhone Kill Switch: How Effective Is It?

iPhone Kill Switch: How Effective Is It?

An interesting article from Darkreading by Eric Zeman  titled ” iPhone Kill Switch: How Effective Is It?” My iPhone 6 Plus was picked from my pocket in Barcelona in March as I walked home from dinner one evening. After speaking to local police for a few moments, I ran back to my hotel to locate […]

Converge 2015 - Hacking To Get Caught - Keynote

Converge 2015 – Hacking To Get Caught – Keynote

Raphael Mudge, the creator of Armitage and Cobalt Strike, will talk about something awesome.

Bug exposes OpenSSH servers to brute-force password guessing attacks

Bug exposes OpenSSH servers to brute-force password guessing attacks

A bug in OpenSSH, the most popular software for secure remote access to UNIX-based systems, could allow attackers to bypass authentication retry restrictions and execute many password guesses.

Researchers Enlist Machine Learning In Malware Detection

Researchers Enlist Machine Learning In Malware Detection

A posting from dark reading by Kelly Jackson Higgins titled “Researchers Enlist Machine Learning In Malware Detection ” No sandbox required for schooling software to speedily spot malware, researchers will demonstrate at Black Hat USA. In 100 milliseconds or less, researchers are now able to determine whether a piece of code is malware or not — and […]

Windows 10 Will Use Virtualization For Extra Security

Windows 10 Will Use Virtualization For Extra Security

An interesting article from informationweek by Kelly Sheridan titled ”  Windows 10 Will Use Virtualization For Extra Security”   When we’re talking about Windows 10features, security upgrades are often edged out of the spotlight by flashy additions like Cortana for desktop, Microsoft Edge, and Universal Apps. Perhaps this is because Microsoft is targeting a broad consumer audience with […]

Ashley Madison Exposed: Affair Hookup Site Hacked, Member Data Posted Online

Ashley Madison Exposed: Affair Hookup Site Hacked, Member Data Posted Online

A posting from Dark Reading by Quick Hits titled ” Ashley Madison Exposed: Affair Hookup Site Hacked, Member Data Posted Online”   Member data pilfered, posted in apparent hacktivist-style doxing attack. Call it hacktivism with a spin: a controversial website for people seeking others who want to have an affair was hacked and personal details of its […]

Why Did A Security Firm Mysteriously Ditch a 'Privacy' Product?

Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?

A posting from Forbes by Yael Grauer titled “Why Did A Security Firm Mysteriously Ditch a ‘Privacy’ Product?” :   Two weeks after Ben Caudill announced that he’d built a $200 hardware proxy which allows Internet users to mask their location, the Rhino Labs owner shut down his project. His much anticipated August appearance at DEF CON, […]

Did Firefox listen to Facebook and just kill Flash? (No, but there's another patch!)

Did Firefox listen to Facebook and just kill Flash? (No, but there’s another patch!)

Did Firefox listen to Facebook and just kill Flash?

Dark Reading Radio: Firewall Smackdown

Dark Reading Radio: Firewall Smackdown

A posting from dark reading by  Marilyn Cohodas  titled firwall smackdown:   Is there a future for the venerable firewall? Join us for a debate between security CEOs Asaf Cidon of Sookasa and Jody Brazil of FireMon. Show time is Wednesday, July 15, 1:00 PM New York/10:00 AM San Francisco. In today’s  BYOD world there […]

Flash zero-day leaks out from "Hacking Team" hack, patch expected Real Soon Now

Flash zero-day leaks out from “Hacking Team” hack, patch expected Real Soon Now

An informative article by paul duckin titled  ” flash zero-day leak out from hacking team  hack, patch expected real soon” Wouldn’t you just know it! Last night we wrote about how Flash troubles come in threes, like those proverbial buses: An emergency update against targeted attacks, followed by… A concerted effort to milk that exploit […]

Cybercriminal Group Spying On US, European Businesses For Profit

Cybercriminal Group Spying On US, European Businesses For Profit

An informative article by  kelly jackson higgins  at dark reading   titled “Cybercriminal Group Spying On US, European Businesses For Profit” Symantec, Kaspersky Lab spot Morpho’ hacking team that hit Apple, Microsoft, Facebook and Twitter expanding its targets to lucrative industries for possible illegal trading purposes. A team of attackers tied to previous hacks of […]

Leaked Emails: How Hacking Team And US Government Want To Break Web Encryption Together

Leaked Emails: How Hacking Team And US Government Want To Break Web Encryption Together

An informative article by Thomas fox-brewster  about “Why China Wants Your Sensitive Data”: Get ready America: one of the most notorious surveillance providers on the planet, Hacking Team TISI NaN%, is expanding in earnest on US shores. And, if it hasn’t collapsed as a result of a hugely embarrassing attack on its servers, the likes of […]

When hackers get hacked: Secretive spy software team falls victim to attack

When hackers get hacked: Secretive spy software team falls victim to attack

An informative article by Laura Hautala at c|net titled “When hackers get hacked: Secretive spy software team falls victim to attack”: It seems no one is safe on the Internet. The latest example: hackers claimed to breach the files of Italian spy software company Hacking Team and then used the company’s own Twitter account to broadcast […]

Cloud & The Security Skills Gap

Cloud & The Security Skills Gap

An informative video on cloud and the security skill gap  from Darkreading.com   F5 Network security evangelist David Holmes offers concrete advice about how cloud outsourcing can help companies with a talent shortfall solve three enterprise security problems: application security, penetration testing, and bug bounties. To look at the video click here:  

Hillary Clinton: China hacks 'everything that doesn't move' in the US

Hillary Clinton: China hacks ‘everything that doesn’t move’ in the US

An informative article by Lee Munson at nakedsecurity.com titled “Hillary Clinton: China hacks ‘everything that doesn’t move’ in the US” US presidential hopeful Hillary Clinton has accused China of state-sponsored hacking designed to steal both trade secrets and government information. Speaking at a Fourth of July campaign rally in New Hampshire on Saturday, the former […]

Enterprise Log Management: An Overview (Part 2)

Enterprise Log Management: An Overview (Part 2)

Enterprise Log Management: An Overview (Part 2)

The Internet of Things Comes to the DoD–With Disastrous Consequences

The Internet of Things Comes to the DoD–With Disastrous Consequences

The Internet of Things Comes to the DoD–With Disastrous Consequences

The SecurityOrb Show – An Interview with Sean-Philip Oriyano, CEO of Oriyano Media, Author, Trainer and Speaker – 6/18/2015

The SecurityOrb Show – An Interview with Sean-Philip Oriyano, CEO of Oriyano Media, Author, Trainer and Speaker – 6/18/2015

An Interview with Sean-Philip Oriyano, CEO of Oriyano Media, Author, Trainer and Speaker

A Record Number Attended the ISSA-LA 7th Annual Information Security Summit on Cybercrime and Solutions at the Los Angeles Convention Center

A Record Number Attended the ISSA-LA 7th Annual Information Security Summit on Cybercrime and Solutions at the Los Angeles Convention Center

A Record Number Attended the ISSA-LA 7th Annual Information Security Summit on Cybercrime and Solutions at the Los Angeles Convention Center

Mozilla Firefox Multiple Vulnerabilities-01 May15 (Mac OS X)

Mozilla Firefox Multiple Vulnerabilities-01 May15 (Mac OS X)

Mozilla Firefox Multiple Vulnerabilities-01 May15 (Mac OS X)

Pidgin Multiple Vulnerabilities Feb 2014 (Windows)

Pidgin Multiple Vulnerabilities Feb 2014 (Windows)

Pidgin Multiple Vulnerabilities Feb 2014 (Windows)

The SecurityOrb Show - An Interview with Jayson E. Street, InfoSec Ranger at Pwnie Express, Author and Speaker - 6/3/2015

The SecurityOrb Show – An Interview with Jayson E. Street, InfoSec Ranger at Pwnie Express, Author and Speaker – 6/3/2015

The SecurityOrb Show – An Interview with Jayson E. Street, InfoSec Ranger at Pwnie Express, Author and Speaker

Apache Web Server ETag Header Information Disclosure Weakness

Apache Web Server ETag Header Information Disclosure Weakness

Apache Web Server ETag Header Information Disclosure Weakness

HACKERS INVADE ST. LOUIS ONCE AGAIN AT @ShowMeConSTL!

HACKERS INVADE ST. LOUIS ONCE AGAIN AT @ShowMeConSTL!

HACKERS INVADE ST. LOUIS ONCE AGAIN AT SHOWMECON!
Be a Part of St. Louis’ ONLY Premier Hacking & Offensive Cyber Security Conference—June 8 & 9, 2015

Page 1 of 3512345...102030...Last »
error: Content is protected !!