Headless OpenVAS install

I needed to run OpenVAS (OpenVAS stands for Open Vulnerability Assessment System) the Linux based vulnerability management software on a virtual machine, which means it does not have its own monitor that one sits at to see this screen: OpenVAS is made by Greenbone, “which develops OpenVAS as part of their commercial vulnerability management product … Read more

We are Never Going to Be Secure

I did not have to put 100% in the headline: i.e. “We are never going to be 100% Secure” Whenever there is a device that is to be used for your purposes,  someone can find a way to use that purpose against you and fight you with it. So it is my assertion: Do not … Read more

Time For Security Major Effort?

I.e. Do we need to make a major research effort to solve all(or most) Cybersecurity problems? Why? Because mistakes keep happening: And these are not small mistakes – they may shift our world underneath us…  As California considers more legislation and Breach reporting requirements, other states may also look into this issue.  At Databreachtoday.com there … Read more

PCI Compliance Small Biz Simplified

There are 12 pieces to PCI compliance, let’s list them and find if they are applicable, or if we can minimize our attention. first of all it is not a major point in the standards, but creating an inventory of devices is paramount in becoming PCI compliant. Being compliant will also be easier for you if … Read more

Phishing #1 Attack – Includes Email Scams

Have you received an email saying your password has been stolen in broken English? Subject: “Security Notice. Someone have access to you system” As you may have noticed, I sent you an email from your account. This means that I have full access to your acc: On moment of crack (youremail@youremaildomain.com)  password: jfwqu6qoizxahofj0qkw You say: … Read more