-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
Well, I think it is understandable that Russia reached out to China for help. These two countries are always politically good relationship. Both of them are Republicanism. Therefore, they may have same approach on cyber security. But I hope Russian don’t move to strict censorship on internet. It is easier for government to control, Chinese p…[Read more]
-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
Energy, telecommunications and finance are definitely three major field that are attacked. I am glad to hear that Trump is paying attention on cyber security. However, we still need to see what and how he is going to make our cyber environment more secure in the future.
-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
1. What is buffer bloat, and what does it have to do with TCP?
Buffer bloat is the undesirable latency that comes from the existence of excessively large (bloated) buffers in systems, particularly network communication systems. In a shared network, “buffer bloat” is a phenomenon whereby buffering of packets causes high latency and jitter, as wel…[Read more] -
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 10 months ago
Here are my Burpe Suite Analysis for Groupon:
Burpe Suite Analysis–Groupon (PPT)
Excutive Summary
-
Mengxue Ni posted a new activity comment 7 years, 10 months ago
I think even for IT professionals who have needs of these tools should apply for admissions to use them. With internal access, it is much easier to hack than external people. There should be a control administrator who can choose to approve or deny the use of these tools in a company. Also, a specific time schedule and signatures must be required.…[Read more]
-
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 10 months ago
Tesla cars can be tracked, located, unlocked and driven away by compromising the company’s smartphone app. Researchers at Norwegian app security firm Promon demonstrated how easy it appears to be to steal a T […]
-
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Indiana’s Madison County is going on Day 5 of a ransomware nightmare. According to Madison County police, both first responders and civic officials are logging all calls for service by hand. Anderson Police, the M […]
-
Mengxue Ni posted a new activity comment 7 years, 11 months ago
In China, we can’t access Google, Instagram. But I know many people use VPN to get on Instagram. I don’t like this policy at all. It restricts a lot of internet information. If they only restrict unwanted information, I think it should be fine. However, they restricted Google and Instagram for no reasons. According to this article, some…[Read more]
-
Mengxue Ni posted a new activity comment 7 years, 11 months ago
I thought real name account can help reduce cyber bullying before. But if Facebook has this kind of issue, then what about twitter, instagram (do not require to use real name). Cyber bullying is really a serious problem that every social media should pay attention on.
-
Mengxue Ni posted a new activity comment 7 years, 11 months ago
The OCR issued a HIPAA Omnibus Rule that will enhance a patient’s privacy protections, provide individuals new rights to their health information and strengthen the government’s ability to enforce the law.
In healthcare, there is a concept called PHI- personal health information. In order to protect PHI and avoid the pitfalls of BYOD, pro…[Read more] -
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Facebook has redesigned its Safety Center to have a greater focus on cyber-bullying. The update brings the Bullying Prevention Hub to everyone on Facebook. The Hub is a resource for teens, parents and educators […]
-
Mengxue Ni posted a new activity comment 7 years, 11 months ago
As an IT security professional, I think I should be concerned with the threat from a pandemic since the absence of important employees would decrease productivities even cause delay of projects. Also, business should protect employees’ health and safety during their work time. Therefore, we will need to prepare a business continuity planning and d…[Read more]
-
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
The Australian Red Cross Blood Service has apologized after a database backup file containing over one million donor records including highly sensitive information on sexual activity was exposed to the public. […]
-
Mengxue Ni posted a new activity comment 7 years, 11 months ago
Converse E-Commerce Site Hacked for Payment Info
Another big company’s data has been breached after Yahoo, Converse’s e-commerce site for Australia was intercepting payment details for website visitors that made purchases between Sept 2 and Oct 12 of 2016. Security researcher Troy broke the news by posting a tweet showing the letter that the…[Read more]
-
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
Group member: Mengxue Ni and Mengqi He
Video
Nessus Vulnerability Scanning Summary
WORD version
PDF versionNessus Vulnerability Scanning Powerpoint
PPT version
PDF version -
Mengxue Ni commented on the post, Euro Bank Robbers Blow up 492 ATMs, on the site 7 years, 12 months ago
Good questions, Roberto! In the article, it mentioned that almost all ATMs across the GLOBE can be illegally accessed and raided without even the need to install malware – because they’re running outdated technology. I don’t know it this report is 100% true, but since Euro banks are suffered from this issue. I think all banks in the world sho…[Read more]
-
Mengxue Ni posted a new activity comment 7 years, 12 months ago
Spam phishing: Phishing attacks use spam (electronic equivalent of junk mail) or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses.
Spear phishing: Spear phishing is highly specialized attacks against a specific target or small group of targets to collect…[Read more]
-
Mengxue Ni wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 12 months ago
492 ATMs across Europe were blown up by thieves in the first half of 2016, as criminals looked to supplement their attempts at infiltrating machines via cyber-attacks. These “cash out” or “jackpotting” attacks […]
-
Hello Mengxue/class- this is a very interesting article that raises good questions about physical and logical security.
We all know that ATMs are protected and the money is also insured so the big question is Why European banks can better their systems and make ATMs more secured?
-
it sounds like these banks need to update their software on the ATM to stop them from using malware to make the money come out (jackpotting) I have never heard of this, I wonder will these cyber criminals attempt to do this on ATM in the US.
-
Good questions, Roberto! In the article, it mentioned that almost all ATMs across the GLOBE can be illegally accessed and raided without even the need to install malware – because they’re running outdated technology. I don’t know it this report is 100% true, but since Euro banks are suffered from this issue. I think all banks in the world should update their system and protect themselves from this.
-
-
-
Mengxue Ni posted a new activity comment 7 years, 12 months ago
Researchers Find Dangerous Intel Chip Flaw
Researchers at the State University of New York and University of California discovered flaw in Intel chips which allows them to bypass ASLR (Address space layout randomization works to defend against a range of attacks by randomizing the locations of code in computer memory). The researchers were…[Read more]
-
Mengxue Ni posted a new activity comment 8 years ago
I think even today I need more than just one paragraph to discusses quantum computing. Quantum computing is one of the resources in the toolkit of cryptanalysts. Quantum computing is based on physical quantum properties to perform operations, which behaves differently than the electronic properties we are used to finding in today’s computers and i…[Read more]
- Load More