January 17, 2019

Please reload

Recent Posts

Company's should treat the Disease of Cyber and not symptoms!

May 6, 2015

1/2
Please reload

Featured Posts

Top Security Stories of 2015

Tuesday, January 5, 2016

  1. Ashley Madison – The Ashley Madison breach impacted politicians, users and many dignitaries as sexual preference information along with names, credit card information and other personal identifiable information were released to the public.

  2. Italian surveillance software maker, Hacking Team suffered a major breach that released 400 gb worth of secret information online.

  3. Both Dell and Lenovo placed many customers at risk by executing a self signing certificate on all personal computers which allowed hackers to intercept communications on public WIFI hotspots. In addition, hackers were also allowed to create their own digital certificates on local pc’s with could capture bank information and all other encrypted information.

  4. CIA – The CIA director believed leaving back doors open in networks is useful when accessing information quickly. This is a very scary though process.

  5. Android – Android phone fell susceptible to an exploit called “Stage Fright”, which allowed hackers to run malicious code on cell phones by sending a simple text message. While Google released patches to conceal the exploit, the releases were too little too late.

  6. Due to the Hacking Team hack, Adobe Flash was labeled as being non-secure for the enterprise. While patches were released to mitigate threats, the difficulty level to implement threats onto a Flash platform is fairly easy. Shortly after, Facebook’s CSO, Alex Stamos called for the end of use date for flash. Currently, flash is being looked at to halt future development.

  7. Equation Group – The Equation Group has been linked to successfully hacking Iran and Russia. Equation has also being linked to breaches suffered in the United States.

  8. LastPass – Password manager LastPass suffered a breach that leaked corporate and private user’s passwords, email addresses and other sensitive information.

  9. Tor – Tor’s network was hacked which revealed innocent and nefarious individuals looking to surf the Internet while masking their identity. Tor believes the breach was orchestrated by the government to track down known black hats. 

Please reload

Follow Us
Please reload

Search By Tags
Please reload

Archive
  • Facebook Basic Square
  • Twitter Basic Square
  • Google+ Basic Square
  • Facebook
  • LinkedIn Social Icon
  • YouTube Social  Icon
  • Twitter Social Icon

CREDENTIALS

 

_MS, Information Security

_CISSP

_CCIE Security

_Certified Information Privacy Profesional (CIPP/US)

_Cisco Intrusion Prevention Specialist 

_CNSS

_FBI InfraGard

 

The Knox Corps. All Rights Reserved.