Tag Archives: Hacking

War Texting with your Smartphone to Hack Cars

While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting.  Most remote control automotive systems use a cellular connection embedded in cars to provide these services.  The … Continue reading

Posted in Ethical Hacking, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment

Are you Ready for Cloud Computing?

Cloud computing offers many benefits, but, it also changes the security equation. Historically, companies kept critical data behind firewalls.  Cloud computing is having a huge impact on the de-perimiterization of network boundaries.  It’s a game changer in that assets are … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , | Leave a comment

The New CompTIA CASP Certification

Later this year, CompTIA will be releasing the CompTIA Advanced Security Practitioner (CASP) certification.   It is time for this certification. It’s targeted directly at individuals that have worked in security for a number of years in “hands-on” security.  We are … Continue reading

Posted in Ethical Hacking, Security Certification, Training and Education | Tagged , , , , , | Leave a comment

Cyber Security Risks for Online Users

Did you know that a report by Sophos in 2009 found that a malicious web site is detected about every 5 seconds? Since then, the pace has only increased.  Internet users must implement basic protections to stay safe while surfing … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

Smart Phone Malware Continues To Spread

While Android users may have previously felt secure, attacks against these devices continue to grow.  A new Android Trojan known as Geinimi  is quickly spreading in China. Security researchers have reverse engineered the malicious code and discovered that Geinimi has … Continue reading

Posted in Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

The DHS Cyber Security Infrastructure Protection Act of 2010

What are your thoughts on giving DHS oversight over portions of the Internet?  A new bill, HR 6423, is planning on doing just that.  This bill would give DHS the right to regulate portions of the Internet that is deemed … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

Employee Access Review – Preventing Access Creep

Access creep is a common problem and one way that employees sometimes end up with a greater level of access than what they should have.  One of the items we examine during a security assessment is employee access. While reviewing … Continue reading

Posted in Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

Michael Gregg Demo’s how Snooping on Strangers is Made Easy with Firesheep

I blogged about sidejacking last week.  This is a common threat and one that cyber security experts have identified as a major security flaw since at least 2004. Fox News asked Michael Gregg to stop by their studio and demonstrate … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment