SPOE – Second Pair of Eyes

When is it necessary?  when entering an important command into a critical system that affects thousands of users. Or when you have to review your network to make sure no holes are found. the attacks on your network are relentless: Bad hackers  will attack your network and own your machines.   Once they own your machines … Read more

Manage a website?

On the Internet if you manage a website then you should update the system in such a manner so that it should not get hacked. If the machine gets hacked you may inadvertently attack other systems.  Hackers are looking for systems to control (owning or p0wned) How are you certain that your IT department is … Read more

Now North Korea may be behind Sony Pictures hack

Wall Street Journal  article   Ever since the odd Press release from north Korea which clearly meant that they were not very happy with the new movie about 2 US spies attempting an assassination of the North Korean leader. FireEye seems to think so ABC news story they have an interesting threat map: https://www.fireeye.com/cyber-map/threat-map.html FBI … Read more

Top Ten Twitter list

Actually I went to Eleven… My top 11 list on twitter:   1. Hacker News Network 2. Techmeme 3. Open Source Way 4. Dr. Phil-haxr !quaxr   @ppolstra 5. Praxiom Research 6. eGuard.me Phone and tablet security news 7. Wired 8. David Hoelzer (SANS IT audit) 9. Command Line Magic  10. Hackread – Security is a Myth 11.  The Hackers Blog You can check … Read more

New Google Security Dashboard

go to http://google.security.com Threatpost has a good post  of the Security devices and Activities  link   https://www.google.com/settings/security The most important part is reviewing your Google activity periodically and to reduce any app permissions if you no longer use them.   Also for administrators the secureaccount link:  https://security.google.com/settings/security/secureaccount The review of online activity is a good aspect … Read more