Assume you are Hacked so get 6 Sigma Security

There are many quotes, and we have endured many breaches in the last year and a half: FBI Director James Comey interview (from October 2014) http://www.cbsnews.com/news/fbi-director-james-comey-on-threat-of-isis-cybercrime/ Good quote: “James Comey: When someone sends you an email, they are knocking on your door. And when you open the attachment, without looking through the peephole to see who … Read more

Risk management Failed Us!

Why you say? We can review our systems that we have and assign a higher risk on some systems depending on the value of the data, it’s function etc. So let’s say you have 3 computer servers There is only so much in money and labor resources, so as an analytical person we assign the … Read more

Anonymity is History: Getting Doxed

What does Dox mean? http://www.urbandictionary.com/define.php?term=dox defines dox as personal information about people on Internet, including real name, known aliases, address, phone number, SS#, cc#, etc. So if you think you can keep your data secret or at least not public (the old method was delist your name and address from phone book) today everyone leaves a trail … Read more

Why is Cybersecurity hard? XXE injection

Where do we start? In the beginning …  well, fortunately we do not have to talk creation or evolution, let’s just go back to early 90’s when the Microsoft Windows Operating system hit a large market share of all personal computing systems. If you look at the early Windows systems, they were not built out … Read more

Ghost: glibc vulnerability CVE2015-0235

How dangerous is it?  It is an inherent Linux glibc vulnerability. RedHat is discussing it on their articles page – has the CVE number 2015-0235 https://access.redhat.com/articles/1332213 It is nicknamed “Ghost” due to the ghostbyname() function calls in the glibc library, specifically: “GHOST is a ‘buffer overflow’ bug affecting the gethostbyname() and gethostbyname2() function calls in the … Read more