Must Patch Microsoft MS015-034 ASAP

Tuesday the patch was released: Here is where it started CVE-2015-1635  Description: HTTP.sys in Microsoft Windows 7 SP1, Windows Server 2008 R2 SP1, Windows 8, Windows 8.1, and Windows Server 2012 Gold and R2 allows remote attackers to execute arbitrary code via crafted HTTP requests, aka “HTTP.sys Remote Code Execution Vulnerability.” the vulnerability was created 20150217 MS:MS15-034 http://technet.microsoft.com/security/bulletin/MS15-034 … Read more

Cyber Attack Industry

Do you wonder what makes these guys who attack us every day tick?   the McAfee Article on the “growth” industry http://www.networkworld.com/article/2911167/security0/cyber-extortion-a-growth-industry.html Personally  I have bumped into a few instances of this phenomena(extortion and cryptolocker):        As well as phone extortion artists After infecting the computer they have you call them and then … Read more

Q: “Will I Get Hacked?” is Wrong Question

The question should be “When will I get Hacked?” Internet Storm center went to Threat level Yellow today: Internet Storm Center threat status: (this morning on 17th threat level went back to Green) – threat Activity died down fortunately and enough of us are patching.   The reason it went yellow for a day is … Read more

Forever Day Vulnerability Affects All Windows Versions

Forever Day is a play on the “Zero-day” vulnerability which means the application vulnerability has not been patched and can be hacked. Forever-day now means it is always vulnerable (unless the software vendors figure out a patch), although it may be a configuration problem.   Dark reading has the story: http://www.darkreading.com/endpoint/new-security-flaw-spans-all-versions-of-windows/d/d-id/1319884 The most interesting paragraph: … Read more

How-To Hack Wifi: Testing Defenses

Hacking Wifi is useful since we want to test our defenses, to make sure we have a certain level of defense set up. Aircrak-ng is used to crack the Wifi encryption that is available on Kali Linux Operating system (the operating system built for pentesters/ethical hackers) As in this tutorial by WonderHowTo there is a few … Read more