How many scans are attacking the Internet?

The 23rd  USENIX  Security conference 8/20 – 8/22 2014 discussed  many subjects There is a specific paper about “An Internet-Wide View of Internet-Wide Scanning” by Zakir Durumeric University of Michigan zakir@umich.edu, Michael Bailey University of Michigan mibailey@umich.edu and, J. Alex Halderman University of Michigan jhalderm@umich.edu So that you do not have to fish the 13 pages out of the 1000 page main document … Read more

Google trying to reduce hacking

Wired story of “Project Zero” Although initially the story is a nice feel good story of hiring George Holtz after he hacks the AT&T iPhone lock and reverse engineering the Playstation 3.   This is a small window into the life of a hacker – where one can figure out the software security cracks and … Read more

Password changes – how to keep track of passwords

The Onion gives a joking reference as to how some choose their passwords.  Putting your livelihood in the ability of hackers to guess your favorite TV show is funny. Some in the security industry recommend passwords to be built with lots of special characters 8 digits long, upper and lower characters, even as that method … Read more

IOSCO predicts cyber space attack coming

The Financial Times discusses a potential “Black Swan” event.  International Organisation of Securities Commissions = IOSCO A Black Swan event definition: A “Black Swan” is a highly improbable event with three principal characteristics: it is unpredictable;it carries a massive impact; and after the fact, we concoct an explanation that makes it appear less random an … Read more

Fake USB drive infects Mac and uploads files

Article at Quora.com Outlines a script called rubber ducky that infects a Mac computer and then uploads your documents directory to wherever the script tells it to. They have tested this  concept with a couple of scripts and methods. This means as we have mentioned before, One should be especially careful with plugging in unknown … Read more