-
Loi Van Tran wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
I found this article interesting as it relates to the same penetration testing tools that we are using in class. Although Meterpreter wasn’t the only tool used, it was the tool that allowed hackers to gain […]
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Thanks for the post Shain,
If this was true, than I can say that this was good thing. Although it was done through illegal means, but if it helped to take down another illegal activity than it’s like fighting “fire with fire.”
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Thanks for posting the article Vaibhav,
This was interesting post, however i believe many apps are collecting personal data as well. When we look at the broader spectrum of consumers, we are not educated to know what these apps are really doing behind the scene. Even as a cybersecurity student, I am not privy to that knowledge. How can…[Read more]
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Thanks for posting the Article Ioannis,
I found it a little strange that they were able to get of the ransomware by simply rebooting the system. I thought that ransomware was more persistent Do you know what variants were used in this attack? I tried to search for it but couldn’t’ find anything.
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Hi Wayne,
Thanks for posting this interesting read. I got a little curious and tracked down the list of 76 apps that was mentioned in the article which is provided in the link below. Most of the low priorities app, I’ve never even heard of and unfortunately the Medium/High risk were not disclosed. It also provided a list of past…[Read more]
-
Loi Van Tran wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
I posted this article in another class, but I thought I should share it here as well. We should all be familiar with ransomware and how it works. If not, the basics is simple; a hacker infiltrates a computers, […]
-
Loi Van Tran commented on the post, Week 2 Question, on the site 7 years, 8 months ago
Supposed to be a separate article.
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Free Ransonware Decryption Tools
There has been a lot of buzz about ransonware, some studies has shown it has increased 750% from 2015 – 2016. The article posted by Darin, shows that it’s now targeting consumers through fake apps that delivers the ransonware.
Well, there might be some hope for companies and consumers that doesn’t want to…[Read more]
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Amanda,
I thought this was interesting and decided to do some more research on the company. It seems that this was not their first data breach. In October 2015, they lost a hard drive containing 1040 records of patient’s names, birth dates, diagnoseses, type of procedure and clinical notes. Before that, in 2012, 56,000 patient information…[Read more]
-
Loi Van Tran commented on the post, Progress Report for Week Ending, February 16, on the site 7 years, 8 months ago
I remember us having quite a few heated discussions whether should or should not provide backdoors into their iOS. The outcome was simple, if Apple didn’t, someone else would. In this case Cellebrite’s. Nothing is 100% secured and even if a piece of technology was intended for the good of all, it can be used in a negative way.
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Thank you for the discussion,
Considering all the development dollars that they put into these devices to make it work, they should put more focus on making them secure. I think it’s all time for regulators to take action, rather than wait until people start dying because their pacemakers were hacked.
-
Loi Van Tran commented on the post, Progress Report for Week Ending, February 23, on the site 7 years, 8 months ago
Very interesting article Darin,
The major problem, as other have mentioned, is the users. They want free stuff, like who really wants to pay $10 month, to watch TV shows and movies. And most times, they will simply do a google search to see if they can find it for free online, but it is not without risk. Downloading and using…[Read more]
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Amanda,
I like the structure that you laid out on how organizational forensics should be conducted. Without structure, policies, and rules it would prove difficult to recover the required evidence. Things such as log monitoring or backups could be inadvertently mishandled; people deleting log files, backups are not performed periodically.…[Read more]
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
According to US-Cert.gov, “Forensics is the process of using scientific knowledge for collecting, analyzing, and presenting evidence to the courts.” It is the act of recovering and analyzing latent evidence; fingerprints at a crime scene, files on a hard drive, or evidence in digital formats. Organizational Forensics is collecting and ana…[Read more]
-
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Bilaal,
My definition of organization forensics is very different than yours, but I tend to agree with you more. In today’s business environment, every organization needs to anticipate and be prepared to respond to breach, or provide digital evidence if requested. Whether it’s to prosecute or defend, having a forensics policy, process, and…[Read more] -
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Ruslan,
You are absolutely right about security professionals must not only understand the technical but the legal aspects as well. They need to consider their policy decisions and technical actions with existing laws. For instance, security professionals in the healthcare industry must understand or be able to navigate through HIPPA…[Read more] -
Loi Van Tran posted a new activity comment 7 years, 8 months ago
Darin,
I don’t know if I remember correctly, but the Professor mentioned that not all “evidence” will require the same amount of control when we talk about chain of custody. Not all evidence is the “murder weapon.” For example, for a murder case recovering the murder weapon and having strict chain of custody is of more importance then…[Read more]
-
Loi Van Tran wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
If you’re a Netflix subscriber and use it on your Android devices, be careful that you don’t download the wrong one! This fake app is a malware that takes over your devices, to include camera, microphone, view […]
-
Loi Van Tran posted a new activity comment 7 years, 10 months ago
There are some inherent differences between open source and commercial network security products.
Open source products are free to use. With open source products a skilled IT professional can look under the hood and tailor the product to organizations specific needs. Everything is customize able with the proper skill set. Although open…[Read more]
- Load More
Hi Loi,
Great article, interesting to see criminal organizations using the same tools we are using in class, and also that they maintained there attack using tools that for the most part are Microsoft utilities. I am curious to see if there is a common exploit used by these organizations in Metasploit to exploit the systems.