31337 hacker tells how he owned Gamma
data.langly.fr has the post in English and very well written The hacker writes well and explains how he owned (penetrated) the website gamma-international.de, which redirects to finsupport.finfisher.com The hacker 31337…
How did the Attacker Gain Entry?
In the realm of incidence reporting and response Management: CERT has a process to use. One has to have a Computer Security Incident Response Team (CSIRT) A security incident occurs…
Smartphone manufacturer Xiaomi downloads all personal data
International Business Times story The Xiaomi phones are sold in China and the head of global expansion was a Google executive. F-Secure a Finnish co. and their blog: Finances of…
Need to decrypt your files from cryptolocker infection?
FireEye and FoxIT have a website to recover your files from an infection – we have an old blogpost about Synology systems getting infected and encrypted. Here is the website…
Dont pick up stray USB hard drives
Another social engineering hacking method is to leave USB hard drives for unsuspecting people. NetworkWorld.com article goes into some details of why the USB hard drive is insecure and can…
