How To Taunt Spammers For Fun And Goodwill

scam-ahead-sign-368pxThere are a ton of computer scams targeting all types of people. Some come in the form of emails claiming to provide something in exchange for a small sum with the goal of stealing that small sum. Others come as a instant message from a friend’s compromised account asking for financial help due to some bogus emergency. There are too scams many to prevent however we can all come together and start investing efforts to waste spammers time. This way they are not using their time to trick another person. One group that has come together with this goal is the 419 Eater found HERE.

In this post, I’ll show you how I like to have fun messing with spammers. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Why You Need an SSL Certificate

certificate1My buddy Dr. Chaos posted about why you need an SSL Certificate HERE. This is a simple 101 overview for those unaware of why this matters.

You can count on a Secure Sockets Layer Certificate to protect your website and customers from security threats. This technology will make sure that your site and private information is protected. There are a variety of different SSL Certificates out there. You want to choose the best one for your specific needs that will authenticate your site to browsers and customers. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

How To Protect Children From Online Predators

predator3Hilary Smith sent me a post and Infographic on her recommendations to protect children from online predators. I’ve posted about this in the past and thought her advise could be helpful for parents with children using the internet.

From Hilary: One look at the information in today’s infographic makes it clear that children – the least security-conscious people on the planet – are having their vulnerabilities exploited. Since we know the problem, let’s talk about solutions. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Wendy’s Looks for Possible Security Breach After Credit Card Fraud

breach1krebsonsecurity posted HERE about how Wendy’s believes they have had a credit card breach and unsure if the incident has been contained.

Wendy’s, the nationwide chain of fast-food restaurants, says it is investigating claims of a possible credit card breach at some locations. The acknowledgment comes in response to questions from KrebsOnSecurity about banking industry sources who discovered a pattern of fraud on cards that were all recently used at various Wendy’s locations. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

The Worst Passwords Of 2015

password12345Splashdata posted about the most common passwords seen in 2015. The original post can be found HERE. Starwars? Princess? Are you kidding me???

SplashData has announced the 2015 edition of its annual “Worst Passwords List” highlighting the insecure password habits of Internet users. “123456” and “password” once again reign supreme as the most commonly used passwords, as they have since SplashData’s first list in 2011, demonstrating how people’s choices for passwords remain consistently risky. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (1 vote cast)

Cisco 2016 Annual Security Report Highlights

CiscoASR_CoverCisco just released its annual Security Report that can be downloaded HERE. This report takes research, insights and perspectives from Cisco and other security experts such as Level 3 Threat Research labs. Topics covered are Threat Intelligence IE trends in web attack vectors, web attack methods and vulnerabilities , Industry Insights IE how the industry is doing, Security capabilities Benchmark Study IE security professional’s perceptions of the state of security and Looking Forward, which covers some case studies and updates on on research targeting reducing time to detection of threats.

Here is a list of some interesting highlights from this report: Continue reading

VN:F [1.9.22_1171]
Rating: 4.7/5 (3 votes cast)

Configure Cisco ASA5506 For Proof Of Value With FirePOWER 6.0

Security-ASA-5506-X_frnt_lt_1000This post will cover how to use a ASA5506 to test FirePOWER functions only using ASDM and command line. Best practices is to leverage a centralized manager however some people have asked if its possible to use the new ASDM management functions meaning performing a Proof of Value (POV) only using a single Cisco ASA5506. The steps will be similar to the recommended way however all management will happen in ASDM.

I posted about setting up a standard FirePOWER POV HERE. Using the standard approach IE having a separate manager offers more functions such as the built in vulnerability scanner and auto IPS tuning. Also the list price for a VM manager for up to two ASAs is dirt cheap. Regardless, some may want to stick with the ASDM manager. For those people, this post is for you. Continue reading

VN:F [1.9.22_1171]
Rating: 5.0/5 (2 votes cast)

An Easy Way for Hackers to Remotely Burn Industrial Motors

hackingcars1Wired posted a interesting article on another car hack. This relates back to the concern of  securing the internet of things meaning protecting anything with a IP address. Using https://www.shodan.io/ and searching for sensitive systems that should not be accessible online shows us that this is still not the case. The original post can be found HERE.

HACKS THAT CAUSE physical destruction are so rare they can be counted on one hand. The infamous Stuxnet worm was the first, causing physical destruction of nuclear centrifuges in Iran in 2009. In 2014, Germany reported the second known case of physical destruction involving a furnace at a steel mill. Both of these attacks required extensive knowledge to pull off. But now a researcher has found an easy way for low-skilled hackers to cause physical damage remotely with a single action—and some of the devices his hack targets are readily accessible over the Internet. Continue reading

VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)