-
Anthony Clayton Fecondo wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 6 months ago
Article
AIG recently began selling cyber security insurance plans on an individual level aimed at the upper class. The article analyzes the various factors that may affect the success of this endeavor. For […]
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 8 months ago
Loi,
This reminds me of how telemarketers spoof their phone number to have an area code similar to the area code of the people they’re calling. It used to be that you see a number from halfway across the country and you ignore it because you could assume it was a telemarketer. Now they spoof their numbers to try to trick you into thinking it…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Metaploit Executive Summary – Fecondo
Metasploit Assignment – Fecondo
-
Anthony Clayton Fecondo commented on the post, Week 3 Question, on the site 7 years, 8 months ago
Bilaal, great post. I loved your point about ethical hackers needing strong moral character. I never really considered the fact, that yes, it would be easy for someone with the technical prowess to take advantage of those who are ignorant of the inner workings of technology. I think the difference in abilities is definitely important and pen…[Read more]
-
Anthony Clayton Fecondo commented on the post, Week 3 Question, on the site 7 years, 8 months ago
I think the most significant ethical dilemma involved with digital forensics is balancing the pursuit of justice with respect for people’s privacy. Many times, an investigation might accidentally involve innocent people. If this were the case, then investigating their data–some of which could be sensitive–could negatively impact data’s owner. In…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Article
The article I chose for this week discusses the increased demand for cyber security in the UK over recent years. In the past five years, the UK’s cyber security workforce has increased by 163%. Since […]
-
Anthony Clayton Fecondo commented on the post, Progress Report for Week Ending, March 15, on the site 7 years, 9 months ago
I think that government regulation would serve as a temporary solution, but I think it fails to address the underlying issue; the need for ubiquitous cyber security awareness. Regulating the problem away keeps consumers in the dark regarding the importance of cyber security and postpones awareness. Once awareness develops, then the market will…[Read more]
-
Anthony Clayton Fecondo commented on the post, Progress Report for Week Ending, March 15, on the site 7 years, 9 months ago
I agree with Jonathan’s point that attackers can make huge profits through the volume of attacks they can make against smaller fish. Generally, the average person has less financial assets than a big corporation, but they also have significantly less security and awareness. As a result, attackers can save a lot of time by foregoing reconnaissance…[Read more]
-
Anthony Clayton Fecondo commented on the post, Week 2 Question, on the site 7 years, 9 months ago
I think part of why the students get caught is because its so easy to connect the dots that if one student’s grades are changing, the perpetrator is probably that student. It’s kind of comical to think about. Another thing that these hackers should keep in mind is that the digital records of their grades are very rarely the only copy of the grades…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 9 months ago
I read an article that summarized an interview with a hacker who was responsible for hacking Freedom Hosting II, a hosting provider that drives about 20% of sites on the dark web. The article touches on the hacker’s process for this attack, but doesn’t actually list the twenty-some steps he took. Originally the hacker intended to just look around,…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 9 months ago
Elizabeth,
Your explanation of digital forensics was thorough and I liked that you identified the various disciplines of organizational forensics and the assortment of regulations and policies that need to be considered during the organizational forensics process. I noticed that your definition, while not explicitly limiting digital forensics…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 11 months ago
Firewalls and routers being combined reminds me of how CPUs now have integrated graphics. Although any serious users will need a lot more power than what’s provided, the integrated graphics provide a bare minimum performance for those who wouldn’t spend money on a dedicated graphics card. I think of this as a similar situation. The integrated…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Powerpoint: burp-suite-presentation-Fecondo
Write-up: burp-suite-report-fecondo
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 11 months ago
Thank you for the information on Locky! I actually just came across this particular malware in a different article, Apparently, locky was the 2nd most utilized malware in both September and October, However, the article didn’t provide any information regarding how locky is delivered or how to protect against it.
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 11 months ago
We learn in this unit that TCP has a lot of features that allow reliable communication on unreliable networks (like the Internet). However, UDP does not have these features… why so you suppose we need a protocol like UDP, and what are some uses for UDP where reliability may not be as important? What do we gain when we sacrifice TCP’s rel…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 7 years, 11 months ago
I think these tools should only be used when permission is specifically granted to use them. For the most part, if you’re using these tools for educational purposes, you should point them at systems you own. The first thing we learned in the intro to ethical hacking course is to only use tools on machines you own or machines that you have been…[Read more]
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Researchers from Invicea Labs recently discovered two zero day vulnerabilities in Belkin’s home automation devices. These vulnerabilities were to SQL injection and cross site scripting. The devices utilize an app […]
-
Anthony Clayton Fecondo wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 12 months ago
Hacker finds flaw in Gmail allowing anyone to hack any email account
Google offers $20,000 bounties for any security vulnerabilities in its applications. The most recent cash-in of this program was to Ahmed […]
-
Anthony Clayton Fecondo posted a new activity comment 8 years ago
I think the most daunting obstacle facing BYOD is for the company to manage sensitive information that are on devices that aren’t company property. When users are suspected of improper behavior on company machines, it is a simple matter to get on that system and investigate. However, if the device isn’t owned by the company, getting access to it…[Read more]
-
Anthony Clayton Fecondo posted a new activity comment 8 years ago
I would be concerned with a pandemic so long as it is occurring in the same geographical location and posed a threat to the organization. Pandemic’s can cause serious harm to an organization by incapacitating the employees of the company. Without the employees, the business can’t function as usual and can suffer serious financial losses as a…[Read more]
- Load More