-
Jason A Lindsley commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 8 months ago
I agree that ransomware is a top threat right now. I found it interesting that two of three respondents use security standards or frameworks to set their foundational controls, but 65% of respondents also indicated that the lack the ability to enforce their required controls. 93% felt that if they could enforce these foundational controls, it…[Read more]
-
Jason A Lindsley commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 8 months ago
I agree with this article that there is definitely a skills gap in our field. It is tough for companies to find the right talent at the salaries they are willing to pay. Most have champagne taste and beer money! A lot of the strong talent seems to be getting absorbed by high tech companies, financial industry, and government contracts. These…[Read more]
-
Jason A Lindsley posted a new activity comment 7 years, 8 months ago
Interesting article. I’m not really surprise that an individuals voiceprint changes over time. I can usually guess whether I’m talking to an older person or a younger person on the phone. Sometimes I’m fooled. Either way, I agree this isn’t a great form of biometric security. It might be helpful in identifying any individual, but I would not…[Read more]
-
Jason A Lindsley commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 8 months ago
Thanks for sharing Shain. I think this is one of the many reasons that Facebook has become so successful. They strategically engage their users to share their emotions, interests, passions, and connections in a way they can correlate that data and benefit from it. I think some of the increased benefits they are experiencing from this are…[Read more]
-
Jason A Lindsley wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Jason Lindsley’s Metasploit Analysis – Assignment #1
PowerPoint Presentation
Metasploit Attack Executive Summary
-
Jason A Lindsley wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
This is an interesting article about fileless memory that does not need to be downloaded to a hard drive. It runs in the kernel or RAM without downloading any payload to the hard drive. Therefore, it could go […]
-
Jason A Lindsley commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 9 months ago
Luckily this was detected and responded to and appears to have had minimal impact. I’m curious as to what triggered the investigation. Usually, an investigation will occur because the card associations (e.g. Visa, MasterCard) identify a fraud trend at specific merchant. Sometimes, however security controls detect anomalies on the network and…[Read more]
-
Jason A Lindsley commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 9 months ago
Thanks for tracking this down Loi Van. That is pretty ironic that the app I use for this class was at one time vulnerable! I am not very familiar with the low and medium priority apps. Hopefully, the developers fix these apps or the rest are released soon!
-
Jason A Lindsley posted a new activity comment 7 years, 9 months ago
I’m not surprised by anything in this article. I assume that any commercial network connected device is tracking my activity and finding a way to profit off of my data. Then I see some of the ad recommendations that are showing up when I browse the web and it’s obvious!
I do believe this is a privacy violation, but I think people have…[Read more]
-
Jason A Lindsley posted a new activity comment 7 years, 9 months ago
This is really disturbing news to me. While I’m glad they took down the sites, it’s especially disturbing that they existed in the first place. It also concerns me that they are accepting bitcoin ransom to put the sites back up. If they actual put one of these CP sites back up, they are essentially profiting for them existing in the first…[Read more]
-
Jason A Lindsley posted a new activity comment 7 years, 9 months ago
This is really cool what they are teaching the youth in Israel. The tools and content now available to teach computers and coding is very vast. I don’t think it is so much of a challenge to teach kids the basics of coding and cybersecurity. I think the greater challenge is finding teachers in the public school system with the knowledge to teach…[Read more]
-
Jason A Lindsley wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
This article is about a recent upgrade to Metasploit to perform penetration testing on IoT devices, including those that are not connected through Ethernet connections. To achieve this, they have updated the […]
-
Jason, I don’t own a Tesla, but I would tell you this is something positive for IoTs and autonomous software before they become more mainstream. IT Security professionals should always look this through the lens of positivity every time Metasploit identify a vulnerability because this represents an opportunity, not only to strengthen the security of those devices, yet also is this a wake-up call for manufacturers to embed strong security features as business strategies.
-
-
Jason A Lindsley wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
…by holding your operating system hostage.
Ransomware has become the most common form of malware over the past few years. Typically ransomware encrypts your key files and the attacker demands payment, […]
-
Good article Jason. Yes, ransomware becomes worse because attackers’ targets expand from big organizations to smaller size companies, and now to individual consumers (PC and mobile devices too). This is a sign that not enough is being done to combat ransomware effectively. This practice is becoming more and more popular. Other than backing up data and operating systems, this is an opportunity for anti-virus vendors to step up their game and create features to address ransomware in a more efficient manner.
-
-
Jason A Lindsley wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
If you still do your shopping in stores, there is reason to be cautious this holiday shopping season when parking your car. A device has surfaced that intercepts clones the signal sent from a key fab and allows a […]
-
Jason A Lindsley posted a new activity comment 7 years, 11 months ago
This is somewhat concerning, but I do agree with Visa that there are several other fraud prevention and detection techniques that mitigate the risk of guessing credit card details. I think that merchant should have more accountability to detect these types of attacks on their payment processing networks. There is never a reason to allow 60,000…[Read more]
-
Jason A Lindsley wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
The following is my Burp Suite analysis exercise for Tastykake:
Tastykake Burp Suite Analysis Executive Summary
Tastykake Burpsuite Analysis Presentation
-
Jason A Lindsley wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Hey everyone,
Here’s a link to the book I was referring to in class. I’m in the middle of it and really enjoying it.
Also, there is a new course on Coursera that was recently released by Princeton […]
-
Jason A Lindsley posted a new activity comment 7 years, 11 months ago
Not sure how I feel about this one. I agree that this is a unique approach and will help to identify users that are vulnerable to leaked passwords, but funding these criminals seems to be enabling to me. When it comes to passwords and authentication, I would prefer Facebook to invest more in cutting edge multi-factor authentication solutions.
-
Jason A Lindsley posted a new activity comment 7 years, 11 months ago
I think regulatory standards would help with proprietary IoT devices that are sold and distributed by common manufacturers, however there are millions of devices developed using open-source software. For example, anyone can buy a RaspberryPi and download some common open source application code from github and connect the device to the internet.
-
Jason A Lindsley posted a new activity comment 7 years, 11 months ago
Unfortunately, I think we are going to start seeing a lot more of this. Leaks of user information for sites such as Ashley Madison have shown how damaging a users browsing history can be. If attackers start to actual expose this type of information via channels such as social media, we may actually see more people paying the ransom (and…[Read more]
- Load More