Command & Control Traffic From Inside Network

It seems everyone should be looking for Command and Control traffic  from inside the network (updated on 04/01/2016)   What does Command and Control mean? It is the last process in the hacking cycle: As we have pointed out: SVAPE & C   Scan, Vulnerability Analysis, Penetrate Exploit & Control from other posts  http://www.fixvirus.com/svapec/ Our … Read more

Lenovo Made Big Cybersecurity Mistake & now Komodia

Here is the underlying Lenovo problem: http://www.kb.cert.org/vuls/id/529496  ” Komodia Redirector with SSL Digestor installs non-unique root CA certificates and private keys, making systems broadly vulnerable to HTTPS spoofing” And unfortunately this Komodia Redirector is inside a Lenovo software installation (Superfish) Here is a Techworld  story: http://www.techworld.com/news/security/lenovo-not-alone-in-suffering-from-superfish-security-flaw-3598898/  which also discusses  the problem both in Lenovo systems: “ Security researchers … Read more

Go Ahead and Hack Us!

  That is the message companies have according to the Christian Science Monitor survey “Conventional wisdom” and results  of the survey are at odds, there is an overall thinking that all companies are now paying attention to cybersecurity or information Security now that Anthem was hacked and the Sony hack occured. But the opposite is … Read more

Your Cyberdefense Still 2000’s Thinking?

Yes it is February 20, 2015 And it is high time you replaced your firewall(FW), just like all computers the new firewalls have better processors and chips to make your speed in Internet browsing faster and if you get a Next Gen FW(NGFW) you can also be more secure.   So as technology gets better, … Read more

Hiring a Hacker for Evil

It seems it is not so hard to hire a hacker for evil. Several articles discuss the how and why: http://bgr.com/2015/01/16/how-to-hire-a-hacker/ There is even a website that apparently  had so much traffic that it bogged down with traffic. NakedSecurity  article: https://nakedsecurity.sophos.com/2015/01/19/hackers-for-hire-hackers-list-for-those-with-no-ethics-or-espionage-skills/ Notice how much traffic some evil is creating, and it is the little “projects” … Read more