What systems did the attacker access?
Will your company ever ask this question? Hopefully the FBI does not call you … As Jim Aldridge from Mandiant says in this youtube video the first thing that will…
Why perform pentesting?
In 2011 Cisco put out a report there are 12.5 Billion devices connected to the Internet and since we have 6.8 Billion people there are more devices than people (tablets,…
Unplug your Synology devices – Cryptolocker ransomware will encrypt
Synology forum has several users falling victim to cryptolocker virus for Synology NAS devices this means that the storage devices will unknowingly encrypt all your data until you pay $350(or…
The 8th network layer is always a problem
As everyone knows – there are 7 OSI network layers. Microsoft explains And this is my favorite Open Source Interconnect (OSI) diagram: So what do I mean about the “8th…
JimmyJohn’s investigating breach with customer credit cards
KrebsonSecurity has the story. There was unauthorized card activity known due to cards that were created by the stolen card data. (this credit card fraud is called “card-present”) The speculation…
