Website Files Ransomed – Not Just Personal Files

This image explains (from PCWorld Article)  The Ransomware image that can occupy your computer if you had the misfortune of downloading the wrong item (malware – virus, etc). Or if your computer was already Pwned (taken over somehow by criminal hackers) and then the criminal sold your computer access to the Ransomware criminal. That is … Read more

Cracking Wifi Passwords Easier Than You Think

The Wifi device that you have (either yourself or by someone else) are setup with: Decide on naming your device, and also decide on the encryption technology to set up the network(your Internet access). Of course you could decide not to encrypt but in that case you are screwed security wise.  So let’s assume that … Read more

I’ll Give You $1k To Use Your Username & PW Over The Holidays

SecTor presentation by Kristin Lovejoy at http://2015.video.sector.ca/video/144598380 There are several business disrupters: The Cloud is changing how software is developed and thus how security should look at the cloud Agile Programming  methodology is changing not just how we develop software but also how we look at security.   Agile programming is reducing the time from … Read more

Best Cybersecurity Practices: SIEM-Log Management

Gartner has a report on the Critical capabilities of Security Information and Event Management(SIEM) software by 13 companies. Each company was analyzed on several characteristics AccelOps, AlienVault, BlackStratus, EMC, EventTracker, HP (ArcSight), IBM Security QRadar, Intel Security, LogRythm, Micro Focus International (NetIQ), SolarWinds, Splunk, and Trustwave Holdings Characteristics that were measured: Real-time monitoring, threat intelligence, … Read more

Torte Botnet Infected 83k WordPress Hosting Servers

  It is an interesting document from the stateoftheinternet.com https://www.stateoftheinternet.com/downloads/pdfs/SpamBot-Investigation-whitepaper-R3.pdf This botnet had 83,000 unique infections (which include webservers running all operating systems) And on page 6 where the researchers revealed the botnet: Using these logged responses, we found that the size of this botnet is fairly large. Over 1,400,000 (including duplicates from the c2) probe requests … Read more