What systems did the attacker access?

Will your company ever ask this question?     Hopefully the FBI does not call you … As Jim Aldridge from Mandiant says in this youtube video the first thing that will happen is the FBI will call you in a somewhat cryptic manner… Tell you the systems that were compromised and what systems compromised them. That’s … Read more

Why perform pentesting?

In 2011 Cisco put out a report  there are 12.5 Billion devices connected to the Internet  and since we have 6.8 Billion people there are more devices than people (tablets, smartphones etc). In fact according to this Cisco report the year 2008 is when the number of connected items (or Internet of things) exceeded the number … Read more

Unplug your Synology devices – Cryptolocker ransomware will encrypt

Synology forum has several users falling victim to cryptolocker virus for Synology NAS devices this means that the storage devices will unknowingly encrypt all your data until you pay $350(or not). When was the last time a ransom note was paid and all was ok again? Synology Facebook is recommending  to power off the DiskStation … Read more

The 8th network layer is always a problem

As everyone knows – there are 7 OSI network layers. Microsoft explains And this is my favorite Open Source Interconnect (OSI) diagram: So what do I mean about the “8th network layer”?   Well I mean the human element  of course.   Got  a new book written by Christopher Hadnagy and Dr. Paul Ekman: “Unmasking … Read more

JimmyJohn’s investigating breach with customer credit cards

KrebsonSecurity has the story.  There was unauthorized card activity known due to cards that were created by the stolen card data. (this credit card fraud is called “card-present”) The speculation is that JimmyJohn’s has been breached and at this point we are waiting for JimmyJohn’s investigation.   In the meantime if you want a delicious … Read more