Cyberjoke Friday edition v1.3

Let’s look at Will and Guy’s joke site today(08/14/2015): http://www.guy-sports.com/humor/computers/computer_jokes.htm   (image from guy-sports.com) E-mail communication can always cause problems… 🙂 Mystery Joke: (a bit dated …) {Ricky, a customer, visits PC Express, the computer store, ‘I’m looking for a mystery Adventure Game with lots of graphics. You know, something really challenging.’ ‘Well,’ replies the … Read more

Great DefCon Talks

According to TonyZ (Fixvirus.com) DefCon23  100 talks and pdf’s I chose 3  to focus on:   Added a fourth later in day :). Created a separate post with another-5th: http://oversitesentry.com/defcon-talk-your-domain-is-compromised-now-what/ )   Risk  discussion: Bruce Potter  A hacker’s Guide to Risk Risk”vs.”Threat”vs.”Vulnerability Risk”tends”to”be”bigger/more”general”than”threat.” Multiple”threats”can”role”up”in”to”a”single”risk Threats”rely”on”vulnerabilities”to”be”realized and more good risk info… to come. WiFi IDS/Firewall for windows: Vivek Ramachandran There is … Read more

GIGO – Garbage In Garbage Out On Firewall

SIEM Security Information Event Management Gartner Magic Quadrant   image from http://www.gartner.com/technology/reprints.do?id=1-2J31FF4&ct=150706&st=sb  Gartner   What is it that we need? To protect our systems and perform functions? Good information from all of our devices.  The above diagram is Gartner’s magic Quadrant  for SIEM – Security Information Event Management, so the top products/companies are IBM Security, Splunk, … Read more

Cloud Computers Can Be Attacked

    Of the 7 black hat white papers I want to focus on the ones that can cause problems for the Cloud Computers.  The above diagram is a general diagram of the amount of companies servicing different IT sectors. Security can affect both Cloud and Virtualization. I quickly outlined the problem yesterday near the … Read more

7 Best Black Hat 2015 White Papers

Do you want to get up-to-speed on latest hacker techniques? Snagged this list from reddit: https://www.reddit.com/r/netsec/comments/3fz6z6/blackhat_usa_2015_presentation_slideswhite_papers/cttslpu   Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor Crash & Pay: How to Own and Clone Contactless Payment Devices Forging the USB Armory an Open Source Secure Flash-Drive-Sized Computer SMBv2: Sharing More than … Read more