-
Marcus A. Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 6 months ago
How Innovative Companies Lock Down Data
This is an interesting article that discusses companies that are going “back to the basics” on security measures of protecting data while trying to incorporate the new […]
-
Marcus A. Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Blockchain’s New Role In The Internet of Things
This article discusses the use of distributed consensus algorithms that combine both performance and security to prevent DDoS attacks such as the Mirai botnet a […]
-
Marcus A. Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
PowerPoint:
Marcus Wilson_Exploiting Metasploitable
Executive Summary
Marcus Wilson_Exploiting Metasploitable Executive Summary
-
Marcus A. Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Interesting article that discusses how most cyber attacks are not overly complicated. It outlines a high level approach on how the author would carry out a simple hack to a network. The author mentions some of the […]
-
Marcus A. Wilson's profile was updated 7 years, 9 months ago
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Below is my Burp Suite analysis:
Summary
Powerpoint
-
Marcus A. Wilson posted a new activity comment 7 years, 11 months ago
link to the Gizmodo article: http://gizmodo.com/it-looks-like-the-san-fransisco-muni-hack-was-worse-tha-1789443579
-
Marcus A. Wilson posted a new activity comment 7 years, 11 months ago
I was just reading about this on Gizmodo. Seems like an expensive and risky way to determine where your flaws are in your environment. I thought it was really interesting that it seems like the FBI usually recommends for the companies to just pay the ransom to get their data back. Definitely a good thing that MUNI was able to do it without giving in.
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Slide Deck: nessus-scan-analysis-mw-ppt
Executive Summary: nessus-scan-analysis-executive-summary-mw
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
This article discusses the details around the distributed denial-of-service (DDoS) attack that occurred on Friday morning using a large number of Internet of Things devices such as webcams, DVRs, and other smart […]
-
This DDoS attack has to make you think. Hackers are always one step ahead of the security. Organization spend resources to keep devices secure, and don’t even think about some of these things that were used in this attack. We can do the best we can, but must always be prepared to deal with a breach or hack. It’s inevitable.
-
-
Marcus A. Wilson commented on the post, Reconnaissance Analysis – Under Armour, on the site 8 years, 1 month ago
Thank you. I browsed around LinkedIn quite a bit and found a good amount of information on the roles at Under Armour. I did not end up including as much personal information in favor of the technical information, but I’ll keep that in mind for next time.
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
I came across this article today that discussed how banks are aggressively moving towards bio-metric authentication methods while cyber criminals are already coming up and testing ways to defeat these. For the […]
-
As you’ve state, the article does bring up a very important point about biometrics data. Although biometrics is considered the most secure way to authenticate and individual, it also has it weaknesses. Unlike other authentications methods like username, passwords, and physical tokens, biometrics identity cannot be replaced, Although the banks are trying to use the most secure method of authentication the really must evaluate the risks of the loss of customer’s biometric data. They can’t simply ask a person to change the password, send them a new token, or give them a 2 year credit monitoring the service. A person’s biometric cannot be simply changed or replaced.
-
It’s alarming to know that even biometric authentication which is supposed to be the most secure means of authentication has its vulnerabilities. The theft of biometric information supports the assertion that nothing is ever completely secure. Even these expensive, cutting-edge biometric systems aren’t completely secure. I think it will be interesting to see what kind of innovations come out of the evolution of authentication methods.
-
Marcus,
I used to think biometric authentication could be a better way to help people secure their asset. After I read this new, I changed my mind because the point that once criminals obtained your biometric information, you can not even change it as passwords. If the data was breached, what can we do to protect ourselves?
-
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Executive Summary:
Reconnaissance-analysis-summary-under-armour
Slide Deck:
Reconnaissance-analysis-under-armour
-
Nice work. Did you happen to look through LinkedIn? Occurs to me you might get a bit more from there.
-
Thank you. I browsed around LinkedIn quite a bit and found a good amount of information on the roles at Under Armour. I did not end up including as much personal information in favor of the technical information, but I’ll keep that in mind for next time.
-
-
-
Marcus A. Wilson commented on the post, Question for this week, on the site 8 years, 1 month ago
The manner that Pegasus was used in this case is wrong and unethical. I think these situations are difficult to judge and cause so much controversy because you never know what a company like NSO intentions really are. Tools like this can be very powerful in stopping terrorism around the world but it sends a completely different message when you…[Read more]
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Hackers that are looking to cause more chaos than financial gain are nothing new, but this article reminded me how scary it can be.
The article describes a potential scenario where a hacker gains access to a […]
-
This is very scary indeed. Altering the data wouldn’t only be a simple thing such as a cosmetic issue, it will also be a functional issue with potential to lose the company millions of dollars. Without getting into too much detail, where I work this type of data is used to authorize transaction made by credit cards. If any of the data is altered, the decision system might approve or decline a transaction that shouldn’t have been.
-
The Pakistan Swift Hack is a good example of this. All it takes is one weak link. So, yes, I would be concerned about some of the smaller institutions.
Wade
-
-
Marcus A. Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
I came across this article that discusses how information security professionals should be adding a data driven approach to complement other techniques while attempting to mitigate the risk of attacks. […]
-
Marcus A. Wilson changed their profile picture 9 years, 1 month ago
-
Marcus A. Wilson changed their profile picture 9 years, 1 month ago