-
Shi Yu Dong commented on the post, Android Malware Secretly Recording Phone Calls and Steals Private Data, on the site MIS 5212-Advanced Penetration Testing 2 weeks ago
Great Post! Very Interesting.
-
Shi Yu Dong wrote a new post, “Finland’s 3rd Largest Data Breach Exposes 130,000 Users’ Plaintext Passwords”, on the site MIS 5212-Advanced Penetration Testing 2 weeks ago
“Finland’s 3rd Largest Data Breach Exposes 130,000 Users’ Plaintext Passwords”
Finland’s citizens had their credentials compromised in a large data breach. Hackers attacked a new Business Center in Helsinki, […]
-
Shi Yu Dong commented on the post, Week 12 Update, on the site MIS 5170-18 Topic: Operating Systems Security 2 weeks ago
“Finland’s 3rd Largest Data Breach Exposes 130,000 Users’ Plaintext Passwords”
Finland’s citizens had their credentials compromised in a large data breach. Hackers attacked a new Business Center in Helsinki, a company that provides business consulting and planning and stole over 130,000 user’s credentials which were stored website database in…[Read more]
-
Shi Yu Dong commented on the post, Week 11 Update, on the site MIS 5170-18 Topic: Operating Systems Security 3 weeks ago
“Microsoft’s Meltdown Patch Made Windows 7 PCs More Insecure”
Meltdown CPU vulnerability was critical vulnerability of CPUs. Upon patching/fixing the vulnerability, Microsoft somehow made the flaw in the Patch/Fix that made vulnerability even worse on Windows 7 OS allowing any unprivileged, user-level application to read content from and even…[Read more]
-
Shi Yu Dong wrote a new post, Dobbs Journal. Memcached servers can be hijacked for massive DDoS attacks, on the site MIS 5212-Advanced Penetration Testing 4 weeks, 1 day ago
An interesting read that I found talked about how Memcached servers can be quickly hijacked and compromised by to launch large DDoS attacks. Utilizing IT spoofing and a poorly implemented UDP causes the servers to […]
-
Shi Yu Dong commented on the post, Week 10 Update, on the site MIS 5170-18 Topic: Operating Systems Security 4 weeks, 1 day ago
An interesting read that I found talked about how Memcached servers can be quickly hijacked and compromised by to launch large DDoS attacks. Utilizing IT spoofing and a poorly implemented UDP causes the servers to be put at risk because attackers will send a packet to the server, which will in turn greatly increase the size and forward the attack…[Read more]
-
Shi Yu Dong commented on the post, Week 09 – Update, on the site MIS 5170-18 Topic: Operating Systems Security 1 month ago
Dubbed RottenSys, the malware that disguised as a ‘System Wi-Fi service’ app came pre-installed on millions of brand new smartphones that actually does not provide any WiFi services but rather takes all sensitive Android permissions to enable its malicious activity.
Ref. Link:
https://thehackernews.com/2018/03/android-botnet-malware.html -
Shi Yu Dong wrote a new post, Fresno State data breach, 15,000 affected!!, on the site MIS 5212-Advanced Penetration Testing 1 month, 1 week ago
Fresno State data breach, 15,000 affected!!
This article relates to the data breach of the California State University, Fresno. According to the article, “the personal information of more than 15,000 p […]
-
Shi Yu Dong wrote a new post, Memcached UDP Reflections Set New Record, on the site MIS 5212-Advanced Penetration Testing 1 month, 1 week ago
Massive 1.7Tbps DDoS reflection/amplification attack was conducted against one of its unnamed US-based customer’s website.
Attackers exploited vulnerability of many internet facing “Memcached” servers, open- […]
-
Shi Yu Dong wrote a new post, The United States is “vulnerable” to cybersecurity attacks said by the co-founder of the computer security firm CrowdStrike, on the site MIS 5212-Advanced Penetration Testing 2 months ago
Computer Security Firm “CrowdStrike” performed research and analysis of recent attacks (NotPetya, WannaCry) targeting U.S. organizations that caused million of dollars in losses. Especially, it has been fou […]
-
Shi Yu Dong commented on the post, Week 5 Update, on the site MIS 5170-18 Topic: Operating Systems Security 2 months ago
Computer Security Firm “CrowdStrike” performed research and analysis of recent attacks (NotPetya, WannaCry) targeting U.S. organizations that caused million of dollars in losses. Especially, it has been found that U.S. administration as top intelligence group is most vulnerable as they can’t keep up with network security threats.
Next-Gen Firew…[Read more]
-
Shi Yu Dong wrote a new post, “Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers”, on the site MIS 5212-Advanced Penetration Testing 2 months, 1 week ago
“Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers”
In Wireless Network Security, given the nature of physics related to Wireless Signal propagation in the air, exposure of Wireless Rad […]
-
Shi Yu Dong wrote a new post, Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites, on the site MIS 5212-Advanced Penetration Testing 2 months, 2 weeks ago
Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites
According to this article “Unpatched DoS Flaw Could Help Anyone Take Down WordPress Websites”, it describes that a simple but serious app […]
-
Shi Yu Dong commented on the post, Discussion Week 14, on the site ITACS 5209 F17 4 months, 1 week ago
Discussion Topic 14.3
I would report my discoveries as required, in any case if the new software engineer is the relative of the VP. The VP can offer whatever he needs however at last, the honesty of myself is more vital than more cash. In the realm of digital security, we would prefer not to energize individuals who infringe upon the law and…[Read more] -
Shi Yu Dong commented on the post, Discussion Week 13, on the site ITACS 5209 F17 4 months, 1 week ago
Traffic on a system can be managed by either Rejecting or Denying. Both these choices are utilized broadly in separating activity from clients to a framework or server. Reject is utilized when the objective host needs to dismiss parcels got from source by sending and ICMP Unreachable message. The reason for Reject is to tell the source that the…[Read more]
-
Shi Yu Dong commented on the post, First US Federal CISO Shares Security Lessons Learned, on the site ITACS 5211: Introduction to Ethical Hacking 4 months, 3 weeks ago
Hi Andres:
Great post! I found very interesting of topic that whether cyber security is a risk management issue or a technology problem, I also found interesting of how to protect our information and data.
-
Shi Yu Dong wrote a new post, Here’s the NSA employee who kept top secret documents at home, on the site ITACS 5211: Introduction to Ethical Hacking 4 months, 3 weeks ago
According to this article, it describes that a former National Security Agency employee named Nghia Hoang Pho pleaded guilty on Friday to Illegally talking classified documents home which were later stolen by […]
-
Will follow up this story in April…
-
Shi Yu,
This is an individual action of someone who is either careless or who doesn’t know what he is doing. his action shows there are government policies that need to be changed and obligate employees to be careful with such sensitive files.
This is a very educative article that I am sure it will teach a lesson to so many people the consequences of taking government documents home. -
It is definitely an interesting read. I wonder what was the motivation of the NSA employee to take the classified documents.
-
-
Shi Yu Dong commented on the post, uber hacked, on the site ITACS 5211: Introduction to Ethical Hacking 4 months, 4 weeks ago
Hi Fred:
Great post. I was very shock that Uber didn’t announced data breach and try to use money to cover up.
-
Shi Yu Dong commented on the post, Weekly Reading Summary, on the site MIS 5202 IT Governance 4 months, 4 weeks ago
In week 11 (IT Risk & Security Management), the following were discussed in the class:
– Risk adopting is a viable strategy for an association to be effective. Recognizing dangers and overseeing them
successfully impacts the achievement of an association.
– The hazard administration design encourages the association to diminish, e…[Read more]
-
Shi Yu Dong wrote a new post, Another Facebook Bug Allowed Anyone to Delete your Photos, on the site ITACS 5211: Introduction to Ethical Hacking 4 months, 4 weeks ago
According to the article, an Iranian web developer named Pouya Darabi discovered and reported a critical vulnerability in Facebook systems that could have allowed anyone to delete any photo from the social […]
-
Quick response by Facebook to fix the bug and it’s interesting to see bug bounty hunters.
-
Interresting…..it s good that they fix it.
-
That’s quite an interesting news and I am surprises to see such flaws from world’s largest social networking community. This is pure case of internal system fix and stands a good example for many businesses related to this. It’s good that it was reported on time before any potential violation occurred and extracted personal images.
-
- Load More