• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Vaibhav Shukla

In new email phishing scam, hackers pose as IRS officials sending ACA tax bills

October 2, 2016 by Vaibhav Shukla 3 Comments

Hackers are impersonating the IRS and sending scam emails to victims asking them to pay balances related to health coverage for 2014

The fraudulent emails pretend to be a CP-2000 notice from the IRS, a notice the agency sends to taxpayers if income or payment information does not match information provided on their tax returns. In the email phishing scheme, the scam emails say victims owe a balance related to the Affordable Care Act health coverage requirements

 

http://www.beckershospitalreview.com/healthcare-information-technology/in-new-email-phishing-scam-hackers-pose-as-irs-officials-sending-aca-tax-bills.html

Yahoo reveals secret after 2 years that hackers stole data from 500 million accounts in 2014

September 24, 2016 by Vaibhav Shukla Leave a Comment

Yahoo claims that around 500 million accounts were hacked in 2014 by what it believed was a state-sponsored actor, a theft that appeared to be the world’s biggest known cyber breach by far

 

https://www.yahoo.com/news/yahoo-set-confirm-massive-data-breach-recode-112614946–finance.html?ref=gs

Reconnaissance Analysis

September 23, 2016 by Vaibhav Shukla 1 Comment

Webex Presentation

powerpoint

summary

Cyber-Security regulations issues by Newyork state department of financial services

September 18, 2016 by Vaibhav Shukla 4 Comments

The New York State Department of Financial Services has proposed a new regulation imposing significant new cybersecurity requirements on banks, insurance companies, and other financial services institutions regulated by DFS .

The new requirements will require such institutions to, among other things, establish and maintain a cybersecurity program, create an immediate response plan for security breaches, and designate a qualified individual to serve as Chief Information Security Officer (“CISO”).  The Proposed Regulation contemplates an effective date of January 1, 2017, with compliance required 180 days later

http://www.jdsupra.com/legalnews/new-york-state-proposes-new-27798/

Hacker making up money by revealing client vulnerability through stock market

September 14, 2016 by Vaibhav Shukla 3 Comments

How can the market players play with security vulnerabilities of different firms…Ill share the news
There is always a pact between a cybersecurity researchers and the companies that when a cyberSec. firm finds a vulnerability in an organization they will report it to the organization directly and get the money in reward or as per the deal.
But a strange thing somehow happened a Cybersecurity Firm- MED SEC found alleged bug in the St. Jude Medical company implantable heart equipment.
MedSec rather than approaching the medical company it went to the shortseller firm MUDDY WATER.
The investment firm Muddy Water would make the vulnerabilities public in exchange for giving the cybersecurity firm a cut of the profits Muddy Waters made from betting against the medical device maker’s stock.
http://www.denverpost.com/2016/09/04/cybersecurity-strategy-insecure-companies-wall-street/

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in