7 Best Black Hat 2015 White Papers
Do you want to get up-to-speed on latest hacker techniques? Snagged this list from reddit: https://www.reddit.com/r/netsec/comments/3fz6z6/blackhat_usa_2015_presentation_slideswhite_papers/cttslpu Abusing Windows Management Instrumentation (WMI) to Build a Persistent Asynchronous and Fileless Backdoor Crash…
CyberJoke Friday v1.2
Enjoy Cyberjoke Friday Aug, 7, 2015 … from http://www.emailgoodies.faketrix.com/pics-computer-jokes-pc-humor-windows-comedy.htm There is this Cartoon: Found Al Lowe’s humor site – he has a few good Cyber Jokes. here are 2 that…
BlackHat Presentation: WMI Architecture Used to Attack
Microsoft’s WMI (Windows Management Infrastructure) presentation by Matt Graeber at BlackHat 2015: https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf You can easily see from the diagram that WMI is integral to Windows technologies. Matt goes on…
Security Policy Can Save You
There are many sites with security policies on the Internet, such as Universities recommending what to do and not do. http://sites.gse.harvard.edu/its/top-10-security-dos-and-donts http://www.feinberg.northwestern.edu/docs/mis/General_Security_Policy.pdf A security policy is a guideline to employees…
ITConundrum Security Catch22’s
Do you know the Heisenberg Principle? Or more precisely “The Uncertainty Principle” https://www.aip.org/history/heisenberg/p08.htm The more precisely the position is determined, the less precisely the momentum is known in this instant,…
