Diamond Model Intrusion Analysis
Did you want to set up your own Intrusion Analysis department? Or at least give a framework for creating a method to understand a breach. Then read this document at…
Zmodo camera Has hardcoded Security Flaw
Here is the “moneyquote”: Once it is scanned, you assign a name and connect to the camera. A very simple and elegant setup solution to get up and running quickly.…
Modern Hackers Good-Bad-Both
I have explained some of the description and history of a hacker on Fixvirus.com post¹: I want to refocus on the 3 types of hackers: White, Gray, and Black hat.…
Mismanagement in Vulnerability Management Systems
I’m always scouring the net for interesting presentations and this is an interesting one, from Bsides Detroit By Gordon MacKay¹ which have been put on the Net by Adrian Crenshaw…
Cyberjoke Friday v1.94
After another crazy week have to create Cyberjoke post for weekend: Here are some images -sometimes better to explain cybersecurity with jokes… above image is from http://blog.marketo.com/2014/06/how-marketers-can-learn-to-speak-it.html At the following…
