Several high profile security vulnerabilities were released in the last few days. Here's a quick rundown of the most relevant to our members.Read More
Most organizations leave their cyber security up to their system/network administrators and/or programmers. Unfortunately this often results in unpatched systems, disabled firewalls, weak passwords, little to no secure software, and other bad practices that make overloaded IT teams’ and hackers’ jobs easier.
Sadly having a dedicated technical security team is a luxury few organizations think they can afford.Read More
Many people already know how to recognize sketchy files - usually they show up as attachments in unsolicited emails and/or have suspect file extensions. Viruses commonly have the .exe extension although several other file extensions are risky like .com, .app, or .vb.Read More
Your password must be between 30 and 60 digits. It cannot contain a word from any known language, it must include at least 1 hieroglyph and 1 sanskrit digit. You must include Pi to 8 digits as well.Read More
No forensics experts were hired to investigate this incident where a librarian with domain administrator access allegedly created another domain administrator account that was used to execute this hack. If true it reflects terribly on the university's network security.Read More
Today’s topic is social engineering. This blog’s title is click bait - congratulations you clicked it! You were just socially engineered and should be angry about it. Now let’s find out why it works.Read More
Cyber security needs people desperately, so how does this happen? We need to create new talent, we need to create paths into the industry to fill these roles. These candidates need to answer these questions for themselves.Read More
In February 2019, a publicly accessible mongo database with no password for verifications.io was discovered.
Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addressesRead More
What are the different kinds of penetration tests and vulnerability assessments? Will you be paying significant money for a cheap service like a vulnerability assessment?Read More
We look at some results from our Icarus SMTP honeypot. We have many spam sources, but we also had some live hackers who are attempting to breach into Largnet.
We also added a quick update on the antivirus performance statistics.Read More