A Single Link Can Destroy Your Data

If you click on the wrong link  this is what can happen: But besides losing all your data if you have other peoples information on your computers now that data can be stolen and deleted or unable to be retrieved if it is encrypted. Ransomware is a scourge that is difficult to fix, if not … Read more

Is Your IT System Low Hanging Fruit For Criminal Hackers?

A couple of questions come mind:  How can the Criminal Hacker tell if my system is weak and thus “Low hanging fruit” What will the criminal hacker do with my systems? How much do you REALLY trust your situation? Criminals have ways of finding your weaknesses – if you have one they will find it. … Read more

Avoiding Detection – Obfuscation the Criminal Game

Reading the Oversitesentry 30 Security Analysis posts I was struck by the recurring theme of detection avoidance and obfuscation is the name of the criminal game.   Specifically: Rapid7’s Blog post¹ on how attackers evade SIEM (Security Information event Manager) and the interesting post by Drops² about obfuscation by Windows programs that run in the 64bit … Read more

TORA! TORA! TORA! Pearl Harbor 74 years ago!

    Although on December 7th is another year gone by for remembering Pearl Harbor attack in 1941 (74 years ago) I want to focus on the suprise attack angle. Tora Tora Tora トラ・トラ・トラ means “We have achieved complete surprise” in Japanese codeword. A translation is Tiger.  Tora (Tορα) is translated to  “now” from Greek. Torah … Read more