Dont pick up stray USB hard drives

Another social engineering hacking method is to leave USB hard drives for unsuspecting people. NetworkWorld.com article goes into some details of why the USB hard drive is insecure and can be easily programmed with malware (malicious software). This malware can be designed to inject itself into your computer, or a server. and without you knowing it … Read more

What systems did the attacker access?

Will your company ever ask this question?     Hopefully the FBI does not call you … As Jim Aldridge from Mandiant says in this youtube video the first thing that will happen is the FBI will call you in a somewhat cryptic manner… Tell you the systems that were compromised and what systems compromised them. That’s … Read more

Why perform pentesting?

In 2011 Cisco put out a report  there are 12.5 Billion devices connected to the Internet  and since we have 6.8 Billion people there are more devices than people (tablets, smartphones etc). In fact according to this Cisco report the year 2008 is when the number of connected items (or Internet of things) exceeded the number … Read more

Unplug your Synology devices – Cryptolocker ransomware will encrypt

Synology forum has several users falling victim to cryptolocker virus for Synology NAS devices this means that the storage devices will unknowingly encrypt all your data until you pay $350(or not). When was the last time a ransom note was paid and all was ok again? Synology Facebook is recommending  to power off the DiskStation … Read more

The 8th network layer is always a problem

As everyone knows – there are 7 OSI network layers. Microsoft explains And this is my favorite Open Source Interconnect (OSI) diagram: So what do I mean about the “8th network layer”?   Well I mean the human element  of course.   Got  a new book written by Christopher Hadnagy and Dr. Paul Ekman: “Unmasking … Read more