Advanced Penetration Testing

Temple University

Disconnect Link Requested

Hello,

 

I wanted to post the link to the site where you can view and download Disconnect search engine and browser.  With Disconnect, the service promises to mask your location to access content as though you’re in a different country, their VPN servers keep you private and allow you to use blocked services, websites and applications, etc…

 

Please see link below and let me know if you have any questions.

https://disconnect.me/

 

Thanks,

Mustafa

Become Splunk Certified

Hey guys,

Some of you might already know this but for those who have not been notified yet, you can attend 4 online courses and become Splunk certified for free 🙂

Check it out!

http://www.internet2.edu/blogs/detail/10079

Week 13 – In the News

Finally, FBI was able to UNLOCK the iPhone without help of Apple.

FBI has been so eager to unlock the iPhone by all means, and luckily they found a third-party company in Israel who was able to assist in decrypting iPhone. This means that now only FBI and Israeli company know about critical vulnerability that will not be shared with Apple. Moreover, FBI has no legal obligation to reveal such a secret.

Therefore, this puts Apple into a very bad situation since FBI has been begging Apple to help unlock the iPhones. Now, Apple has to figure out a critical vulnerability on their own without help of FBI.

Details at: http://thehackernews.com/2016/03/fbi-ublock-iphone.html

Week 13: InTheNews

DoD is about to be under siege from hackers – and it plans to pay – New Department of Defense Bug Bounty kicks off April 18, by Michael Morisy, WindowsIT Pro, March 31, 2016

The military is seeking the help from hackers between April 18 and May 12, and will offer bounties from a $150k budget to those who find vulnerabilities in specifically identified DoD websites. Other “Critical, mission-facing computer systems will not be involved in the program.”  The program is being run by a startup Hackerone.com which provides a “vulnerability coordination & bug bounty platform” and claims to support 132 public programs, with ‘$6.81M bounties paid’ and ‘20,411 bugs fixed’, and ‘2,554 hackers thanked’.

http://windowsitpro.com/security/dod-about-be-under-siege-hackers-and-it-plans-pay-them

 

Week 13: In the news

“Ransomware, hospital hacking present growing cybersecurity threats”

Hackers crippled computer systems at a major hospital chain, MedStar Health Inc., one of the the largest health care providers in the Baltimore-Washington metropolitan area, on Monday April 1, 2016. Employees were prompted with a note when they tried to open files on their computers requesting payment in bitcoins to unlock the data while forcing records system offline for thousands of patients and doctors. A similar ransomware attack on Hollywood Presbyterian Medical Center in Los Angeles last month led to the hospital paying about $17,000 in bitcoins to regain access to its computer systems. But most importantly, the true risk exists when the hackers can sell the medical record data, alter patient data, access billing information, or manipulate vulnerable devices.

Click here to read more information regarding the above article.

Week 13 recent Cyber Security News…

In the Cyber Security News lately

Malware detected in Martel’s cameras used by police department (as reported back on 11/17/2015 via ehackingnews.com)…

www.ehackingnews.com/2015/11/malware-detected-in-martels-cameras.html

“iPower Technologies, a U.S security company and network integrator, has discovered a copies of Conficker malware in the Martel Frontline Camera with GPS, one of the largest manufacturers of police in-car video systems in America, whose product is being sold and marketed as a body camera for official police department. When the camera was connected to a computer, iPower’s antivirus software immediately caught the virus and quarantined it.  However, if the computer did not have antivirus actively protecting the computer it would automatically run and start propagating itself through the network and Internet, iPower said in a post. In the iPower virtual lab environment, packet captures were also run on the infected PC to view the viruses’ network activity using Wireshark. The virus, classified as a worm virus, immediately started to attempt to spread to other machines on the iPower lab network, and also attempted several phone home calls to Internet sites.”

1 2 3 8