-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
The Philadelphia ransomware has begun targeting healthcare organizations, in a targeted campaign likely carried out by amateurs. According to Forcepoint researcher Roland Dela Paz, the attack involves using […]
-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
When I tried to exploit ports, it said “exploit completed, but no session was created”. I could not solve the problem yet, does anyone know how to solve it? I would appreciate the help!
5212 Assignment […]
-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Kali Linux is an open source Debian-based operating system for penetration testing and forensics. It comes wrapped with a collection of penetration testing and network monitoring tools used for testing of software […]
-
It’s a good thing that NetHunter requires physical access; otherwise, it would have been much easier for cyber criminals to cause much greater damage with it. We must also remember that it is still a dangerous tool that can fall into the hands of an organization’s number one threat, disgruntled employees.
-
-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
Ruslan Stoyanov-head of Kaspersky Lab’s computer incidents investigation team and two Federal Service (FSB) officers Sergei Mikhailove and Dmitry Dokuchayev were arrested two months ago. The treason case had b […]
-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 10 months ago
When it comes to how successful business will be at defending against the top attacks of the day, the results are sadly lackluster: research reveals that only 3% of organizations have the technology and only 10% […]
-
I agree that ransomware is a top threat right now. I found it interesting that two of three respondents use security standards or frameworks to set their foundational controls, but 65% of respondents also indicated that the lack the ability to enforce their required controls. 93% felt that if they could enforce these foundational controls, it would mitigate the risk. So we all agree with the controls required to reduce this risk, but seems there is a lack the skills and or funding to implement the controls.
-
-
Mengxue Ni commented on the post, Week 3 Question, on the site 7 years, 10 months ago
Explain where you think ethics plays a role in how we deal with digital forensics.
I think ethics plays important role in how we deal with digital forensics because forensics team has the privilege access to information systems and data in a company. Examiners will be exposed to trade secrets, data, confidential information. Some private…[Read more]
-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 10 months ago
Social Media phishing attacks jumped by a massive 500% in Q4,2016. The report claimed fraudulent accounts across sites like Twitter and Facebook increased 100% from the third to fourth quarter. So-called “angel p […]
-
Mengxue Ni commented on the post, Happy Birthday SNL // the typists from the Carol Burnett show, on the site 7 years, 10 months ago
Very interesting news, Ryan.
I am curious why they choose cyber techniques as the primary skill for children. It will be difficult to teach kindergarten children how to code. But it is good to know all the basic cyber knowledge.
-
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 10 months ago
Microsoft has asked President Donald Trump’s administration for an exception to the executive order (EO) on immigration that bans travel from seven majority-Muslim Countries.
The computing behemoth is seeking a […]
-
Mengxue Ni commented on the post, Progress Report for Week Ending, March 1, on the site 7 years, 10 months ago
Nice comment on the news, Amanda,
I didn’t remember the incident, but I think every professior talks about academic dishonesty at the beginning of classes. But still students can come up with different ways to cheat. I felt cheating was useless because one day you have to work in the society, there is no chance to cheat. Also, even if you have…[Read more]
-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
How Hackable Is In-Flight Wi-Fi? We’re About to Find Out
Public Wi-Fi is always a vulnerability that exposes to hackers. Free Wi-Fi at airports, restaurants, coffee shops are available for everyone. If you connect with a fake Wi-Fi that was created by hacker, your information will leak immediately.
In the news, they did an experiment. The c…[Read more] -
Mengxue Ni wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 10 months ago
Finally, some good news is posted. The white hats emerged this week after Mozilla revealed that more web pages are now loaded by Firefox using the secure HTTPS protocol than not.
As of 30 January, the figure […]
-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
good answer, Vaibhav!
I saw the word “digital forensics” many times in your post. I agree that organization forensics is digital forensics, but I am still wondering if organization forensics=digital forensics. If so, we just need to give definition to digital forensics then. Is organization forensics different from digital forensics?
-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
Great examples, Bilaal.
Thank you for providing examples of digital forensic tools and forensics considerations. I am still confused by the differences between organization forensics and digital forensics. Can I understand it as digital forensics readiness is the process of collecting digital evidences and organization forensics is the result of…[Read more] -
Mengxue Ni posted a new activity comment 7 years, 10 months ago
I really like your answer! Jonathan.
It is very easy to understand and short to read. I would recommend to emphasis the use of laws. But other than the legal use, I think you did a very good job on describing organization forensics. -
Mengxue Ni posted a new activity comment 7 years, 10 months ago
Great post, Amanda!
I totally agree that digital forensics is heavily used in organization forensics because of technologies. It should be easier to find criminals than science forensics since computer footprints are easier to track than physical footprints. Also, there are policies and regulations in a company and the country. -
Mengxue Ni posted a new activity comment 8 years ago
D14.1: Discussion Topic 1:
The HIPPA Privacy Rule establishes national standards to protect individuals’ medical records and other personal health information and applies to health plans, health care clearinghouses, and those health care providers that conduct certain health care transactions electronically. This is the description of HIPPA.…[Read more] -
Mengxue Ni posted a new activity comment 8 years ago
In the presentation, we see that there are two actions when not passing traffic… We can reject or deny. What is the difference between these? When might you use one or the other?
Reject means that for every packet received an ICMP port unreachable packet is sent to the source address. This tells the remote host that your system is up and r…[Read more]
-
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Security experts have warned that patient data is at risk after it was revealed that 90% of NHS Trusts in England are still running the unsupported Windows XP operating system. A Freedom of Information Act request […]
-
Mengxue Ni posted a new activity comment 8 years ago
I agree with all of your ideas, although Tesla cannot fully protect their user from a compromise device, they still need to take some actions to secure the application. If they have done everything they can to protect customers, no one will blame them when hacking happens.
- Load More