BlackHat Presentation: WMI Architecture Used to Attack
Microsoft’s WMI (Windows Management Infrastructure) presentation by Matt Graeber at BlackHat 2015: https://www.blackhat.com/docs/us-15/materials/us-15-Graeber-Abusing-Windows-Management-Instrumentation-WMI-To-Build-A-Persistent%20Asynchronous-And-Fileless-Backdoor-wp.pdf You can easily see from the diagram that WMI is integral to Windows technologies. Matt goes on…
Security Policy Can Save You
There are many sites with security policies on the Internet, such as Universities recommending what to do and not do. http://sites.gse.harvard.edu/its/top-10-security-dos-and-donts http://www.feinberg.northwestern.edu/docs/mis/General_Security_Policy.pdf A security policy is a guideline to employees…
ITConundrum Security Catch22’s
Do you know the Heisenberg Principle? Or more precisely “The Uncertainty Principle” https://www.aip.org/history/heisenberg/p08.htm The more precisely the position is determined, the less precisely the momentum is known in this instant,…
Network Security Has Fundamental Problems
A breach has many looks… THE fundamental problem is highlighted in this article: http://www.infosecurity-magazine.com/news/15mn-affected-medical-information/ Besides the obvious headline grabber “1.5mil records stolen by hackers.” I am going to compile a…
Cyber Joke Friday v1.1 #Cybersecurity
A great Murphy’s law site on the Net: http://www.murphys-laws.com/murphy/murphy-computer.html All murphy’s laws, but I want to focus on computers… and specifically Cybersecurity Compiled the 6 of them on my top10……
