What I'm doing about the Equifax Breach
Submitted by ep on
Submitted by ep on
Submitted by ep on
As a security professional, I spend a lot of my time making sure that the bad guys aren't able to break in. I set up all the fancy firewalls and anti-virus to keep us safe. But what happens when a user unknowingly gives up their credentials due to a phish? Well, if you are lucky, the spammers just use it to spam the world. If you are unlucky, the figure out how to attack the inside of your network to get to the crown jewels.
Submitted by ep on
Submitted by ep on
Deep packet inspection is a methodology that network security professionals have been doing for many years. It involves looking at the data going over the network and determining if anything malicious is going on based on what's in those packets.
Submitted by ep on
My last post on Ransomware was in 2013 when we were being hit by Cryptolocker. I mentioned that in around 2010 Data Doctor 2010 was the ransomware in the news. According to Wikipedia, the first "ransomware" was called the "AIDS Trojan" in 1989, which didn't encrypt your files, but merely hid their data by encrypting the filenames.
Submitted by ep on
NJEDge has released two Security Awareness videos, one for Students, and another for Faculty and Staff that reviews various topics in keeping yourself safe online.
Here are the links:
http://www.njvid.net/showvideo.php?pid=njcore:39068 Students
Thanks to NJEDge!
Submitted by ep on
The security community has been buzzing over Lenovo's gaff of including Superfish Adware with their Lenovo laptops. Superfish comes pre-installed with a compromised root CA, which is by default installed into the trusted certificate store of system web browsers.
Submitted by ep on
A recent update to Google Chrome is now warning users that certificates do not have public audit records. They put a yellow triangle over the normal lock display in the location bar and give a somewhat confusing explanation.
Submitted by ep on
Although November is here, let's not forget the many lessons we learned this year from CyberSecurity Awareness Month (CSAM). The majority of issues I spoke about related to technologies that are dead, or should be dying in the 2014 Tech Obituaries section of my talk. Here are the highlights of what technology died (or should have) over the last year.
Submitted by ep on
Three years ago, Thai Duong and Juliano Rizzo demonstrated [1] an attack against one of the methods used in securing Internet traffic.