Cloud Computers Can Be Attacked
Of the 7 black hat white papers I want to focus on the ones that can cause problems for the Cloud Computers. The above diagram is a general diagram of…
7 Best Black Hat 2015 White Papers
Do you want to get up-to-speed on latest hacker techniques? Snagged this list from reddit: https://www.reddit.com/r/netsec/comments/3fz6z6/blackhat_usa_2015_presentation_slideswhite_papers/cttslpu Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor Crash…
CyberJoke Friday v1.2
Enjoy Cyberjoke Friday Aug, 7, 2015 … from http://www.emailgoodies.faketrix.com/pics-computer-jokes-pc-humor-windows-comedy.htm There is this Cartoon: Found Al Lowe’s humor site – he has a few good Cyber Jokes. here are 2 that…
BlackHat Presentation: WMI Architecture Used to Attack
Microsoft’s WMI (Windows Management Infrastructure) presentation by Matt Graeber at BlackHat 2015: https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf You can easily see from the diagram that WMI is integral to Windows technologies. Matt goes on…
Security Policy Can Save You
There are many sites with security policies on the Internet, such as Universities recommending what to do and not do. http://sites.gse.harvard.edu/its/top-10-security-dos-and-donts http://www.feinberg.northwestern.edu/docs/mis/General_Security_Policy.pdf A security policy is a guideline to employees…
