Command & Control Traffic From Inside Network
It seems everyone should be looking for Command and Control traffic from inside the network (updated on 04/01/2016) What does Command and Control mean? It is the last process in…
Lenovo Made Big Cybersecurity Mistake & now Komodia
Here is the underlying Lenovo problem: http://www.kb.cert.org/vuls/id/529496 ” Komodia Redirector with SSL Digestor installs non-unique root CA certificates and private keys, making systems broadly vulnerable to HTTPS spoofing” And unfortunately…
Go Ahead and Hack Us!
That is the message companies have according to the Christian Science Monitor survey “Conventional wisdom” and results of the survey are at odds, there is an overall thinking that all…
Your Cyberdefense Still 2000’s Thinking?
Yes it is February 20, 2015 And it is high time you replaced your firewall(FW), just like all computers the new firewalls have better processors and chips to make your…
Hiring a Hacker for Evil
It seems it is not so hard to hire a hacker for evil. Several articles discuss the how and why: http://bgr.com/2015/01/16/how-to-hire-a-hacker/ There is even a website that apparently had so…
