Today’s topic is social engineering. This blog’s title is click bait - congratulations you clicked it! You were just socially engineered and should be angry about it. Now let’s find out why it works.Read More
Cyber security needs people desperately, so how does this happen? We need to create new talent, we need to create paths into the industry to fill these roles. These candidates need to answer these questions for themselves.Read More
In February 2019, a publicly accessible mongo database with no password for verifications.io was discovered.
Compromised data: Dates of birth, Email addresses, Employers, Genders, Geographic locations, IP addresses, Job titles, Names, Phone numbers, Physical addressesRead More
What are the different kinds of penetration tests and vulnerability assessments? Will you be paying significant money for a cheap service like a vulnerability assessment?Read More
We look at some results from our Icarus SMTP honeypot. We have many spam sources, but we also had some live hackers who are attempting to breach into Largnet.
We also added a quick update on the antivirus performance statistics.Read More
This project’s goal is to create a SMTP honeypot to collect malware and automatically upload it to virustotal. Simple and to the point. In the future I will expand the honeypot’s features, including the ability to accept attachments and automatically forward them to virustotal to be analyzed.Read More
Japanese government passing legislation allowing their National Institute of Information and Communications Technology (NICT) to attempt to breach their citizens’ home and business networks.Read More
Security has increased greatly in the last 10 years, both in understanding and implementation.
Cyber Security has clearly and objectively gotten much better so we feel safe predicting this trend will continue in the future.Read More
A large password dump has surfaced today, January 17th 2019, and it’s one of the largest dumps to date being uploaded to Have I Been Pwned. Twice the size of the Myspace breach, nearly 5 times larger than the Linkedin breach.Read More