-
Arkadiy Kantor wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
How To Find Cybersecurity Vulnerabilities Across Your Environment
This article is written by a former CTO who talks about how he managed security at his data center. He talked about the “shotgun test” whic […]
-
Arkadiy Kantor wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Insurance giant AIG has recently started selling “personal cyber security insurance”. Corporate cyber security insurance has been around for a while with interesting consequences. Making claims has often been dif […]
-
Arkadiy Kantor wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
I thought this article was interesting because it focused on the social aspect of security. It talks about how most people are not aware of suber security risks and they are not properly trained. The Article […]
-
Arkadiy Kantor wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 10 months ago
Metasploit Presentation
Metaploit Summary
-
Arkadiy Kantor commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 11 months ago
testing
-
Arkadiy Kantor posted a new activity comment 8 years, 1 month ago
I have been hearing about this for the past year in my neighborhood, in fact my car “broken” into several times. I am not 100% certain if I had left my door open but it sounds like some people are keeping their keys in the fridge because the fridge makes a great Faraday cage lol.
-
Arkadiy Kantor posted a new activity comment 8 years, 1 month ago
its great that they released a new firmware, but I wonder how often do people stay on top of keeping things updated with such devices? I havent seen or heard of security devices being on the radar for IT folks typically and are probably forgotten once they are installed.
-
Arkadiy Kantor wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
My analysis was on Philly.com attached are my findings.
Summary
Presentation
-
Arkadiy Kantor posted a new activity comment 8 years, 1 month ago
Why such a high tech solution? It should be as simple as creating a “gray list” of websites that publish fake news. A way to flag or vote for websites as being “fake” should be a really way to manage this. Also let users opt in/out of seeing the fake news, that way everyone is happy? What do you think?
-
Arkadiy Kantor posted a new activity comment 8 years, 1 month ago
I have heard of another vulnerability with people being able to steal a Tesla simply by resetting the owners Tesla account and creating a new password. While getting a car stolen is not fun I hope tesla does a good job at maintaining security for a car that is in motion, since any “hack” of a moving car with passengers in it can become deadly!
-
Arkadiy Kantor posted a new activity comment 8 years, 1 month ago
I was just reading about another Andoid malware attack that has affected over a million phones! Its a shame that there is no better way to secure the Android ecosystem and that carriers and vendors have different methods of updating and maintaining the phones, in addition many people run on older versions of android.
-
Arkadiy Kantor wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Since we had a brief discussion about TOR last class I thought this article was interesting. It talks about a Zero-Day exploit that propagated on the TOR network. It took advantage of a FireFox exploit and was […]
-
Arkadiy Kantor wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
Video: https://youtu.be/boA6HZjZy3E
kantor-nessus-scan-presentation
Summary
-
Arkadiy Kantor wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
Recon Assignment by Arkadiy Kantor:
recon-assignment Summary
recon-presentation
Video:
-
Arkadiy Kantor wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 2 months ago
This is an interesting twist on disclosing breaches. This can become an interesting conflict for an organization that may need to contain a breach for various reasons while also having an obligation to its […]
-
Arkadiy Kantor commented on the post, Temple student: I used Target gift card to get past security in 9 buildings, on the site 8 years, 2 months ago
Not surprising, I don’t spend much time on campus but I see the same faces posted at the same entrances and they never seem happy or engaged. While its hard to tell students apart from someone who may be looking to do something bad they will hopefully stop someone who erratic or totally out of place. But I think this type of security is also more…[Read more]
-
Arkadiy Kantor commented on the post, Warning! Your iPhone Can Get Hacked Just by Opening a JPEG Image, PDF or Font File, on the site 8 years, 2 months ago
Mobile OS’s are also now just as important as Desktops since many people many not even use a desktop anymore so the malware developers are going to be focusing on mobile platforms.
-
Arkadiy Kantor commented on the post, Punish Companies for Cyber Security Failures, Directors Say, on the site 8 years, 3 months ago
I think that is a great idea, Hospitals are punished for HIPPA violations and from my experience they take HIPPA breaches extremely seriously as they are costly. Money seems to be a great motivator.
-
Arkadiy Kantor commented on the post, WordPress user enumeration hacking, on the site 8 years, 3 months ago
WordPress sounds like a never ending security mess! Always seeing news about new WP vulnerabilities.
-
Arkadiy Kantor commented on the post, Question for this week, on the site 8 years, 4 months ago
I think most organizations find themselves in a similar struggle where they have a core mission or objective to make something good while maintaining good intentions they end up with an internal struggle where the engineers/developers have goals to achieve success by designing or developing something to be used for “good” while on the other hand…[Read more]
- Load More