Ashley Madison Hack Proves CyberSecurity Must Be Six Sigma Secure
We have to continue “learning” from high profile hacks. As you may have read in the news a “dating” site that attracts extra marital hookups has been hacked by some…
Defend Your Systems
We have to continue “learning” from high profile hacks. As you may have read in the news a “dating” site that attracts extra marital hookups has been hacked by some…
Check out this computer joke section: http://www.surfersam.com/friends/funny-computer-jokes.htm Surfer Sam has several interesting computer jokes (my opinion of course) Artificial Intelligence usually beats real stupidity. I always love the old computer…
The talk on pdf form at Defcon media servers: Inter-VM data exfiltration – The art of cache timing covert channel on x86 multi-core By Etienne Martineau a kernel developer. So…
Patch Tuesday August ( 8/11/2015) Here is Microsoft patch Tuesday August 2015 edition https://technet.microsoft.com/en-us/library/security/ms15-aug.aspx How can I say that unpatched computers will get hacked? Any Metasploit pentester will tell you…
Bart Kulach has a pdf from this year’s Defcon23 “Hack the Legacy! IBMi (aka AS/400) revealed” He recommends to check the website he set up http://www.hackthelegacy.org/ The items he has…