-
Donald Hoxhaj posted a new activity comment 7 years ago
Amanda – Very interesting article. I read up some more on this article and found out that hackers were able to singe the malicious installation executable (v5.33) using a valid digital signature issued to Priform by Symantec. The hackers also used DGA (Domain Generation Algorithm) so if the server went down they could use DGA to generate new…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
https://thejournal.com/articles/2017/09/19/users-getting-better-at-identifying-phishing-attacks.aspx
End Users Getting Better at Identifying Phishing Attacks
This article talks about the following: according to data from Wombat Security Technologies users are getting better at recognizing phishing attacks, users performed better this year on…[Read more] -
Donald Hoxhaj posted a new activity comment 7 years ago
Andres – I found the last article you posted “https://imgur.com/gallery/rNlQJuT” very interesting. It provides a lot of additional google hacking methods that can be used in the future. It would be great if there was a site that has all the available search operators? It will be great, if anyone knows a site that contains all the available searc…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
http://www.technewsworld.com/story/84772.html
Cyberthieves Train Their Sights on US Mobile Phone Customers
This article talks about the following: New form of cybercrime focuses on hijacking mobile phone account number then transferring services to a different device, there is a vulnerability in today’s security protocols where companies a…[Read more]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Consumers Gain More Power to Seek Data Breach Damages
This article talks about the following: The federal apples court decision handed down earlier this month, significantly expand the circumstances under […]
-
Donald Hoxhaj wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years ago
Credit Agency Equifax Cracked, 143 Million Consumers Exposed
This article talks about the following: Equifax suffered a major criminal data breach that exposed personal information of as many as 143 million […]
-
Donald,
Again, One of the three major consumer credit reporting agencies was attacked by hackers who were able to access to more than 134 Million people sensitive information. According to the New York Times, this is the third cyber security attack since 2015 and and one of the largest risks to the personal sensitive information. This large organization has most of American sensitive information such as Social Security numbers and addresses (PII), which means that most of people in the US information are already hacked and saved in the attackers databases. I don’t believe that these organizations don’t invert on their IT department especially their capitals are people information.
-
-
Donald Hoxhaj posted a new activity comment 7 years ago
http://www.technewsworld.com/story/84798.html
Russia, Fake News and Facebook: 24/7 Manipulation
This article talks about the following: Foreign countries manipulating citizens by pushing out fake news in social media, both the sides left and right are ignoring facts and instead pushing out fake as long as it benefits them, Facebook…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
Joseph – Interesting article, this cyberattack was not sophisticated but instead a wholesale attack, hopping that people will fall for it. It’s amazing the amount of people that were affected by the ransomware in such short period. I wonder if there were any organizations that were affected by the ransomware. If yes, was that due to lack of c…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
http://www.technewsworld.com/story/84728.html
Cry Hero Arrested on Kronos Malware Charges
This article talks about the following: U.S authorities arrested a British cyber-researcher credited with stopping the spread of the WannaCry ransomware, British cyber-researcher developed the “Kronos” malware prior to stopping the spread of Wan…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
http://www.technewsworld.com/story/84790.html
Global Cyberattack on Energy Sector Stokes Deep Fears
This article talks about the following: Hacker group known as “Dragonfly” has deployed sophisticated attacks on the energy sectors of Europe and North America, Attacks on energy sector is complex but if they do decide to attack it could lea…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
http://www.technewsworld.com/story/84794.html
US Elections: Open Source vs Commercial Software
This article talks about the following: San Francisco becoming the first US city to adopt open source software for voting machines, Open source software being widely accepted in other areas, Open source software benefits of bringing cost down,…[Read more]
-
Donald Hoxhaj posted a new activity comment 7 years ago
Great post, Fred!
I find your post very informative especially for someone like me that does not have a IT Audit background. You provided a thorough analysis of the case and was able to suggest few areas where the company could have improved their policies. Great post again very informative to see someone else point of view from a different background.
-
Donald Hoxhaj posted a new activity comment 7 years ago
I totally agree with your statement, phishing should be considered hacking. The only difference is the method used to obtain the information. However, I do not agree with the statement phishing is considered an authorized method. I believe the difference between the two methods is the following: phishing – is voluntary, hacking is involuntary.
-
Donald Hoxhaj posted a new activity comment 7 years, 1 month ago
Hello everyone! My name is Donald, I graduated from Temple University in 2014 with a BA degree, majoring in Accounting & MIS . I currently work under the Tax department where we focus in improving clients processes and implementing TOM (Tax Operation Manger) . TOM is a tool developed internally which allows clients to easily manage and…[Read more]
-
Donald Hoxhaj commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 9 years, 9 months ago
Knowing about both business and technologies, what would be valuable business skills that MIS majors can have but other majors (marketing, finance, or engineering) don’t?
The ability to understand how technology works give you a big advantage when faced with making decisions that require implementation of new technologies.How does eChoupal c…[Read more]
-
Donald Hoxhaj commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 9 years, 9 months ago
As CIO of IVK, how would you explain the incidents at Ch. 10 to Wall Street analysts?
I would explain the current statues of the issue and assure them that the problem is under control.How would you explain the difference between a distributed denial of service (DDoS) attack and an intrusion to a non-IT boss or colleages?
(DDoS) attack is…[Read more] -
Donald Hoxhaj commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 9 years, 9 months ago
What constitutes “transaction costs” in capital expenditures?
Expenses incurred when buying or selling securities. Transaction costs include brokers’ commissions and spreads the difference between the price the dealer paid for a security and the price the buyer pays. The transaction costs to buyers and sellers are the payments that banks and bro…[Read more] -
Donald Hoxhaj commented on the post, Day 9 – Strategic IT Outsourcing (I) – online discussion questions, on the site 9 years, 11 months ago
Why is Google operating its own cafeterias with full-time chefs and cooks for its all employees, instead of outsourcing to external caterers?
Google is an employee friendly company. Its financial reputation is so huge that firstly it can afford to have its own chefs. Moreover, having own chefs ensures that the quality and delivery of food will be…[Read more] -
Donald Hoxhaj commented on the post, Day 8 – Enterprise Architecture – online discussion questions, on the site 9 years, 11 months ago
Any other example like SmarTip or MetroCard in which customers can use a standard payment system to use different services?
One very famous example that can be quoted is Bitcoins which has gained sufficient popularity in the recent world. Bitcoins serve as another virtual currency payment system for millions of consumers.
Why is flexibility in…[Read more] -
Donald Hoxhaj commented on the post, Day 7 – IT Governance – online discussion questions, on the site 9 years, 11 months ago
What would be a case in which senior management does not serve the best interests of shareholders?
Even though the utmost purpose of a senior management is to serve its shareholders, there are instances when it is unable to keep up to the words. Example, if a company is not making much profits, then in such cases the management is unable to…[Read more] - Load More