-
Brent Hladik wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Interesting take on how much it is costing companies to take care of ddos related kinds of attacks. As well as what they do to handle them.
-
Brent Hladik wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Interesting article on how top leaders view how they see companies handling security related issues. Also on how well they are handling them.
-
Brent Hladik wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
About time for facebook to make their stuff more secure. Would have thought they would have thought about this from the beginning.
-
I am particularly sceptical with Facebook’s strategy considering the recent sham it was exposed to with selling data. I guess making it more social may not be an effective way of demonstrating ethicality. The best way is to make information not social, but rather secure. The article says that ‘There’s a design focus on making sure users can easily identify and find the most important security tools’. This would actually be great for marketers and advertisers to use security tools, but not sure how beneficial this is for consumers.
-
-
Brent Hladik wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Interesting article on how encrypted attacks create issues for corporate defenses.
-
Brent Hladik wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
Interesting article in relation to bitcoin wallets and the new cryptocurrency’s.
-
Brent Hladik commented on the post, Discussion Week 4, on the site 6 years, 11 months ago
Good example here I feel that companies that truly lack IT governance make policies like this then that in turn back fires and causes circumstances like this where some group try to act like they are “gods” and have all control over everything where as other groups would have no access to that. It the company had IT governance in place it would…[Read more]
-
Brent Hladik commented on the post, Discussion Week 5, on the site 6 years, 11 months ago
I think open sourced protocols would be ideal in some situations as it would allow some companies, governments etc to make modifications as needed to meet potential security needs as they see fit. If they don’t then they are basically left with what ever is the standard and stuck with any risks that may impact anyone else using those non open…[Read more]
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Speaking of wordpress since we use that here 🙂 This site basically sums up how vulnerable sites that use
a WordPress plugin are potentially to sql injection related attacks. Hopefully our schools site do […]
-
Hi Brent,
Thanks for sharing your views. WordPress in fact also has many other vulnerabilities. I have personally used it and though it is widely preferred for web application and search development, its security practices are not strong enough to prevent such attacks and this was quite obvious as I read the article. There has to be a lot of stricter procedures that needs to be followed before accepting plugins from users -
Bent,
I won’t be surprised with this number that shows how many websites are infected with SQL injection attacks. I believe these big umber reflects the number of different reasons why people attack sites:
– Money: The goal is collects revenues from people after injecting them with viruses
– Ability to collect sensitive information.
– Ability to damage other organizations or people IT resources in the goal of causing hams that can lead them to lose business or even personalities.
-
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This site goes over in detail what happened to the Whatsapp application recently where their
encryption apps were even broken into. It just goes to show that anything is potentially vulnerable if
if it is […]
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Here we can see what attempts the federal govt is taking to secure the govt networks.
It is good to see that they are trying to step up their security more and more.
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This article is interesting in all of the different kinds of cyber tools out there that companies could use to
analyze any kind of potential cyber security attack on their systems.
-
the vast amount of tools listed in this article was massive. But of the 4 trends were interesting. As a programmer I thought it was interesting how cybersecurity deployment being a software based model. This is for control, visibility, and flexibility. The other 2 trends that struck me were how Israel is becoming the Cyber Silicon valley and its due to how Israeli cybersecurity startups have come to dominate the innovation.. The other two trends are what we learned in class and relted to AI and the steps hackers take. This article referred to the steps as Cyber Kill Chain contains seven links: reconnaissance, weaponization, delivery, exploitation, installation, establishing command and control, and actions on objectives.
-
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Despite everyone’s concern about the Russians using Kaspersky to spy on the governments computer systems there is no evidence that this has occurred. While at the same time ruining a corporations image. […]
-
Its important that so much of this Russian hacking into the Presidential election is speculation. Nothing has been proved therefore its theories, claims, or accusations. People wat to blame Russia due to Putin and Trump relationship and they isolate a company and vendor. Its a shame that the media has taken their frustrations on a copany: Kapersky Lab.
-
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This is an interesting article in that it discusses how attackers used a combination of malware
and network sniffers to attack users to try to gain their bank information. This is pretty unsettling a […]
-
Brent,
That’s an interesting article for sure. It has practically becoming very concerning to trust banks. The recent attacks on Australian banks too has put up a question to raise i.e. Whom should we trust to safeguard our hard earned money? The thing to actually see is how soon can banks overcome this crisis and put an end to malware attacks -
Brent,
There will be always new ways to attach people and organizations. The biggest question would be, do these organizations such as bank do the right things to protect us? I am assuming the answer is no, Until now days, these companies don’t really care about building strong IT security departments, they don’t really invest on building strong IT architectures that can fight to protect consumers data.
Thank you for the article, it’s really interesting.
-
-
Brent Hladik wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
This is kind of scary considering more and more of our appliances/devices connect to the internet.
It is scary because if hackers really want to mess with major corporations they can potentially […]
-
Brent Hladik commented on the post, Discussion Week 8, on the site 7 years ago
Basically as all others stated here as more and more people get sick there is greater risks for people who have greater roles in the company to fall ill to sickness and will impact others because others won’t know what they did to perform those roles. As more and more people get sick it can potentially grind IT operations to a complete halt. To…[Read more]
-
Brent Hladik commented on the post, Discussion Week 6, on the site 7 years ago
So what is understood of quantum cryptography is that it can dramatically reduce the time needed to break a symmetric key algorithm as well as the aes-128 for example. When this does become mainstream a lot of the known standards will become obsolete due to how quick they will be broken.
In terms of the length of time needed to where this…[Read more]
-
Brent Hladik commented on the post, Discussion Week 5, on the site 7 years ago
Basically what Kerckhoffs’s principle was saying was that anything that was to be secure via cryptography and all should remain secure even while everything else about the product is public knowledge. Personally I don’t think that proprietary algorithms are a good idea period. As they are not fully trusted as an industry standard and there is no…[Read more]
-
Brent Hladik commented on the post, Discussion Week 4, on the site 7 years ago
In terms of what should and should not be approved on a corporate network I think the white list route should be implemented. In this case the corporation has control on what gets installed on their pc’s and will help potentially prevent unwanted tools that could potentially have some kind of malware tied to them. If a company goes the blacklist…[Read more]
-
Brent Hladik commented on the post, Week 2 Presentation, on the site 7 years ago
https://thehackernews.com/2017/10/bad-rabbit-ransomware-attack.html
This is the latest in terms of ransomware that has started to make an impact on the world. This could be something a lot more severe than what we are used to seeing with the current ransomware scams. All should be alert with this one because this could potentially be severe.
-
Brent Hladik commented on the post, Hacking Article, on the site 7 years ago
I would have to say that this is indeed a successful hack in the sense that they were able to use both social engineering and phishing attacks in order to get the information they need to get all of the funds transferred to their accounts This wasn’t a simple thing to do and took a well coordinated attack on a major system to get what all they…[Read more]
- Load More