My IT is outsourced – I don’t worry about security

Recently I had a discussion with an executive, and he said he outsourced his IT functions, so I don’t have to worry about it anymore.  Is that right? So i searched for a theoretical talk… —————————————————————————————————————————- Black hat 2014 had several talks about Cyberspace security – Jason Healy discussed how to save Cyberspace SEP = … Read more

How to defeat malware

In my experience the best anti-malware software is Malwarebytes  When your Antivirus software can’t find the malware, then download malwarebytes and clean the systems. especially those Point of Sale systems that seem to be infected by the  Russian cyber gangs.   The Malwarebytes blog is also a good read

Why perform Alpha Scans on a regular basis?

People are always asking me – “Why should I have you run an Alpha scan for me?” Because a hacker may have been there already – not a “good” ethical hacker, but the Black hat  variety: As the Internet Storm Center discusses today: the Infosec community forum post  There are certain ports that should not … Read more

Nmap an excellent tool for scanning

nmap.org  has some info, but we also review sites with insight into scanning.    Nmap is short for Network Mapper. Ethical hacking – Penetration Testing  By Bhargav Tandel Nix Craft  also a good site about nmap insights  NixCraft is an online community of new and seasoned Linux / Unix sysadmins who want to make the … Read more

Test your Bash Shell

how to test for vulnerable Bash shell: Execute the following: $ env x='() { :;}; echo vulnerable’ bash -c “echo this is a test” on the command line, if it comes back with this is a test then the system is vulnerable If the system returns: bash: warning: x: ignoring function definition attempt bash: error … Read more