Vulnerabilities Can Be Exploited

(Sunday reflections and current news) Specifically the Seagate NAS  Business Storage Line Today’s Internet Storm Center has the story. This is the method the attackers can use to hack the devices(From ISC): “It appears to be trivial to exploit the devices and a metasploit module and an exploit are publicly available.” PII(Personally Identified Information) was bought … Read more

Exploit Home Routers Then Pharm DNS servers

Yes another slightly new style of attack: http://www.networkworld.com/article/2889933/hackers-exploit-router-flaws-in-unusual-pharming-attack.html There are a couple of slightly new twists in this hacker style attack. Proofpoint found the attack (as a spam protection company they see all kinds of emails)  https://www.proofpoint.com/us/threat-insight/post/Phish-Pharm Here is definition of pharming: “Attackers use poisoned DNS servers to redirect address requests, usually for online banking … Read more

Go Ahead and Hack Us!

  That is the message companies have according to the Christian Science Monitor survey “Conventional wisdom” and results  of the survey are at odds, there is an overall thinking that all companies are now paying attention to cybersecurity or information Security now that Anthem was hacked and the Sony hack occured. But the opposite is … Read more

Your Cyberdefense Still 2000’s Thinking?

Yes it is February 20, 2015 And it is high time you replaced your firewall(FW), just like all computers the new firewalls have better processors and chips to make your speed in Internet browsing faster and if you get a Next Gen FW(NGFW) you can also be more secure.   So as technology gets better, … Read more

Hiring a Hacker for Evil

It seems it is not so hard to hire a hacker for evil. Several articles discuss the how and why: http://bgr.com/2015/01/16/how-to-hire-a-hacker/ There is even a website that apparently  had so much traffic that it bogged down with traffic. NakedSecurity  article: https://nakedsecurity.sophos.com/2015/01/19/hackers-for-hire-hackers-list-for-those-with-no-ethics-or-espionage-skills/ Notice how much traffic some evil is creating, and it is the little “projects” … Read more