How does a hacker attack? video explanation

SVAPE&C explanation video (special edition of fixvirus security show) Let us know if that helps you understand Pentesting Use the Sigma Scan to do SVA at least. http://oversitesentry.com/solutions/sigma/   Sigma Scan is Alpha Scan + Nessus/Nikto, it depends on what the alpha scan revealed.     Contact Us. to help you    

#OpFrance CyberJihad Attacking French Websites By Thousands

Twitter is aflame with the various tweets of the attackers and viewers of what is going on:     After my quick review of the top ten in our Security Analyzed page this morning, I saw NakedSecurityBlog https://nakedsecurity.sophos.com/2015/01/17/cyberjihadists-attack-thousands-of-french-websites-after-charlie-hebdo-massacre/ With a review of http://www.thelocal.fr/20150116/hackers-take-down-20000-french-websites website with the headline: “Islamist hackers attack 20,000 French websites”   It … Read more

What does state-of-art Spear Phishing Look Like?

Hackread has the story: http://hackread.com/outlook-web-app-phishing-page-on-russian-site/  screenshot from fake page as on Hackread That looks like a standard OWA access panel right?  Except that it is actually on a Russian site designed to steal your credentials.   If you received an email stating: “check your email with this link, must see document ” Then your click … Read more

Set-Up Proper Internet Security

While reading the ~20 blogs this morning the one from F-Secure hit home: http://community.f-secure.com/t5/BSB-Blog/Why-Internet-security-should/ba-p/65567 Elija is discussing why we should have Internet security: “The 24/7 work culture is also one reason for using the same devices both for work and for leisure. This in turn may lead to a situation where social media activities and … Read more

Still Discussing Sony Attack … but why?

The reason is that it was a _Destructive_ attack. Credit card numbers were not stolen. Data was deleted and stolen. Highly unusual attack. Dark Reading  has a story on the “destructive” attack. http://www.darkreading.com/how-not-to-be-the-next-sony-defending-against-destructive-attacks-/d/d-id/1318516 ” “If your only goal is to do damage,” says Jonathan Sander, strategy and research officer for Stealthbits Technologies, “you don’t need a lot … Read more