Do You Believe There is a #CyberSecurity Problem?

Do I really need to list the last year’s events? Sony was a class on its own Hacked and data exfiltrated, and then deleted, who did it does not really matter. HomeDepot and  Target  started with a breakdown (HomeDepot and Target malware) and escalated to millions of CC# breaches. Anthem was a failure http://krebsonsecurity.com/2015/02/anthem-breach-may-have-started-in-april-2014/ and Deep Panda … Read more

Improve Cybersecurity – Let’s Teach More Infosec

We want to help the Cybersecurity labor shortage – What is the fastest way to teach more cyber aware people? It will require everyone to think a different way. learn the process of the hackers… (SVAPE&C)   http://www.fixvirus.com/svapec/   A specific regimen of educating yourself. Which certificate do you study and complete for? When a career … Read more

More Sophisticated Attacks = We Must UP CyberSecurity

This is the problem in all of these stories – somehow the client computer was infected. (how can we stop it in the best manner possible)?   There are plenty of stories streaming of the sophisticated nature of the Cyber criminals: http://www.csoonline.com/article/2892442/malware-cybercrime/the-cybercrime-economy-personified.html “The ready availability of free cybercrime applications invites participation in the cybercrime economy … Read more

Vulnerabilities Can Be Exploited

(Sunday reflections and current news) Specifically the Seagate NAS  Business Storage Line Today’s Internet Storm Center has the story. This is the method the attackers can use to hack the devices(From ISC): “It appears to be trivial to exploit the devices and a metasploit module and an exploit are publicly available.” PII(Personally Identified Information) was bought … Read more

Exploit Home Routers Then Pharm DNS servers

Yes another slightly new style of attack: http://www.networkworld.com/article/2889933/hackers-exploit-router-flaws-in-unusual-pharming-attack.html There are a couple of slightly new twists in this hacker style attack. Proofpoint found the attack (as a spam protection company they see all kinds of emails)  https://www.proofpoint.com/us/threat-insight/post/Phish-Pharm Here is definition of pharming: “Attackers use poisoned DNS servers to redirect address requests, usually for online banking … Read more