Dont pick up stray USB hard drives
Another social engineering hacking method is to leave USB hard drives for unsuspecting people. NetworkWorld.com article goes into some details of why the USB hard drive is insecure and can…
What systems did the attacker access?
Will your company ever ask this question? Hopefully the FBI does not call you … As Jim Aldridge from Mandiant says in this youtube video the first thing that will…
Why perform pentesting?
In 2011 Cisco put out a report there are 12.5 Billion devices connected to the Internet and since we have 6.8 Billion people there are more devices than people (tablets,…
Unplug your Synology devices – Cryptolocker ransomware will encrypt
Synology forum has several users falling victim to cryptolocker virus for Synology NAS devices this means that the storage devices will unknowingly encrypt all your data until you pay $350(or…
The 8th network layer is always a problem
As everyone knows – there are 7 OSI network layers. Microsoft explains And this is my favorite Open Source Interconnect (OSI) diagram: So what do I mean about the “8th…
