-
Ioannis S. Haviaras's profile was updated 6 years, 7 months ago
-
Ioannis S. Haviaras's profile was updated 7 years, 2 months ago
-
Ioannis S. Haviaras changed their profile picture 7 years, 2 months ago
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
In this week’s article, a study was performed by Pew Research Center which examined the knowledge that American’s have of Cyber Security. Some of the questions asked in the survey were regarding botnets, ran […]
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
Verifone, a massive credit card point-of-sales machine manufacturer, has been breached. On Jan 23, 2017 an urgent email from Verifone’s CIO, Steve Horan required employees to change their password. Verifone s […]
-
Why do companies tend to have users change their passwords themselves as an initial step to interact with employees or consumers after a potential security breach? Isn’t such reaction become too predictable for hackers? If so, aren’t they using this in their own advantage? I’m not saying it’s a bad strategy to suggest so; however, I believe a superior approach should be developed. For example, companies can implement a system that automatically assign a random/temporary password to users, then prompt them to create a new one instantly after a security breach. This will allow more users to change passwords faster and help all internal parties focus better on the best tactic to combat the system breach.
-
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Researchers at Ben-Gurion University in Israel have developed a way to steal data off of someone’s hard drive by infecting the desired computer with malware and reading data through the blinking LED light that i […]
-
Glad you posted this Ioannis. I saw this earlier this week. It’s an interesting concept, but I imagine this would be really difficult to coordinate. Air-gapped systems also usually have very high physical security controls and are located in rooms with no windows or doors. This is a good reminder of the importance of these controls. The article mentions keeping air-gapped machines in secure rooms away from windows, placing film over a building’s glass designed to mask light flashes, or even putting a piece of tape over the LED. Most data centers I’ve visited are behind closed doors in rooms with no windows.
-
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Executive Summary
Presentation
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Organizations across the world have a gap in cyber security talent. With the RSA conference concluding this week the news articles this week seem to have the same theme that cyber security talent is lacking. […]
-
testing
-
I agree with this article that there is definitely a skills gap in our field. It is tough for companies to find the right talent at the salaries they are willing to pay. Most have champagne taste and beer money! A lot of the strong talent seems to be getting absorbed by high tech companies, financial industry, and government contracts. These are high risk and usually highly regulated/audited companies that frankly cannot afford to have a skills gap. Therefore they are willing to pay the extra salary for highly qualified individuals.
-
Well, this should not be a surprise because most private organizations have not taken cyber security serious until recent years. Therefore, it will take some time before students realize demand is rapidly growing in this field. It won’t be long before cyber security talent’s demand catches up with software programming. In fact, these two will go hand-in-hand in the future because whatever is written will certainly need to be protected too. And one of the best ways to accomplish so is to have coders develop and implement proper security strategies. This is how to build on a solid foundation.
-
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Arby’s Restaurant Group (ARG) was the latest victim to succumb to a credit card breach. This breach was due malicious software being installed on payment card systems throughout hundreds of its locations n […]
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Eight days prior to President Trump’s inauguration, the Washington DC Police Department had to take their cameras offline from January 12 to 15. This is the result from a ransomware attack that plagued 123 of t […]
-
Ioannis S. Haviaras wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
In today’s digital world cybersecurity is a necessity in every organization. However, there needs to be a balance between productivity of your employees and the security of the organization. If employees believe t […]
-
Ioannis S. Haviaras posted a new activity comment 7 years, 11 months ago
D14.1:
This situation can be seen in many organizations not just healthcare. Anything that involves an urgent matter that needs to get taken of quickly sometimes requires these unsafe methods to transport this information. Even though these might be isolated incidents, these incidents could ultimately lead to leakage of sensitive data. An…[Read more]
-
Ioannis S. Haviaras posted a new activity comment 7 years, 11 months ago
What is buffer bloat, and what does it have to do with TCP?
Bufferbloat is high latency in packet-switched networks caused by excess buffering of packets. When this occurs the sizing of the buffers makes the TCP congestion control algorithm fail. The TCP connection then slows down and bottlenecks causing TCP to fill up and then buffer again. An…[Read more]
-
Ioannis S. Haviaras wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
When Trump begins his presendency on January 20th he will be leading a country that has the highest number of ransomware controlled computers in the world. Three areas in which cyber security is critical to our […]
-
Ioannis S. Haviaras wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
BurpSuite Assignment Summary
BurpSuite Assignment Presentation
-
Ioannis S. Haviaras posted a new activity comment 8 years ago
I believe that these tools are essential in vulnerability testing of your organization. These tools ultimately protect outsiders from getting data that people would not want to have disclosed to the public. Not every IT professional however should have access to these tools, only ones that know how to you them wisely should have access. These…[Read more]
-
Ioannis S. Haviaras wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
With Donald Trump’s win this past week cybersecurity could have a new face in the White House, Rudy Giuliani. Giuliani has been head of several cyber security investigations in a law firm he works for and is one […]
-
Ioannis S. Haviaras wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Chinese courts have signed into law an agreement that will make it more difficult for companies to house data on servers inside the country. The data that is housed in the country must now be censored even though […]
-
Ioannis S. Haviaras posted a new activity comment 8 years ago
The issue with BYOD devices is that many people who bring these devices in do not have them readily updated. If these devices aren’t updated they can leave holes in your network creating a target for hackers to exploit. In order for people to bring their own devices in an organization a plan must be executed in order to make these devices safe…[Read more]
-
Ioannis S. Haviaras posted a new activity comment 8 years ago
As an IT security professional you cannot be concerned with a pandemic as a threat. Since a pandemic only concerns personnel and not systems, this however could affect the personnel that work with these systems. In a worse possible scenario other people could be obtained as temporary workers with similar knowledge.
Threats that are worth…[Read more]
- Load More