Cloud Computers Can Be Attacked
Of the 7 black hat white papers I want to focus on the ones that can cause problems for the Cloud Computers. The above diagram is a general diagram of…
Defend Your Systems
Of the 7 black hat white papers I want to focus on the ones that can cause problems for the Cloud Computers. The above diagram is a general diagram of…
Do you want to get up-to-speed on latest hacker techniques? Snagged this list from reddit: https://www.reddit.com/r/netsec/comments/3fz6z6/blackhat_usa_2015_presentation_slideswhite_papers/cttslpu Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor Crash…
Enjoy Cyberjoke Friday Aug, 7, 2015 … from http://www.emailgoodies.faketrix.com/pics-computer-jokes-pc-humor-windows-comedy.htm There is this Cartoon: Found Al Lowe’s humor site – he has a few good Cyber Jokes. here are 2 that…
Microsoft’s WMI (Windows Management Infrastructure) presentation by Matt Graeber at BlackHat 2015: https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf You can easily see from the diagram that WMI is integral to Windows technologies. Matt goes on…
There are many sites with security policies on the Internet, such as Universities recommending what to do and not do. http://sites.gse.harvard.edu/its/top-10-security-dos-and-donts http://www.feinberg.northwestern.edu/docs/mis/General_Security_Policy.pdf A security policy is a guideline to employees…