New Cisco Annual Security Report is Out

It is good to review this Annual report: http://www.cisco.com/web/offers/pdfs/cisco-asr-2015.pdf   (may have to fill out some information to get it)   key discoveries: 1) 1% of all high urgency CVE (Common vulnerabilities and Exposure) were actively exploited. This means organizations must prioritize and patch high urgency vulnerabilities. 2) Since Blackhole exploit kit in 2013, it … Read more

How does a hacker attack? video explanation

SVAPE&C explanation video (special edition of fixvirus security show) Let us know if that helps you understand Pentesting Use the Sigma Scan to do SVA at least. http://oversitesentry.com/solutions/sigma/   Sigma Scan is Alpha Scan + Nessus/Nikto, it depends on what the alpha scan revealed.     Contact Us. to help you    

#OpFrance CyberJihad Attacking French Websites By Thousands

Twitter is aflame with the various tweets of the attackers and viewers of what is going on:     After my quick review of the top ten in our Security Analyzed page this morning, I saw NakedSecurityBlog https://nakedsecurity.sophos.com/2015/01/17/cyberjihadists-attack-thousands-of-french-websites-after-charlie-hebdo-massacre/ With a review of http://www.thelocal.fr/20150116/hackers-take-down-20000-french-websites website with the headline: “Islamist hackers attack 20,000 French websites”   It … Read more

What does state-of-art Spear Phishing Look Like?

Hackread has the story: http://hackread.com/outlook-web-app-phishing-page-on-russian-site/  screenshot from fake page as on Hackread That looks like a standard OWA access panel right?  Except that it is actually on a Russian site designed to steal your credentials.   If you received an email stating: “check your email with this link, must see document ” Then your click … Read more

Set-Up Proper Internet Security

While reading the ~20 blogs this morning the one from F-Secure hit home: http://community.f-secure.com/t5/BSB-Blog/Why-Internet-security-should/ba-p/65567 Elija is discussing why we should have Internet security: “The 24/7 work culture is also one reason for using the same devices both for work and for leisure. This in turn may lead to a situation where social media activities and … Read more