-
Neil Y. Rushi commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 7 months ago
I mostly use Internet Explorer – I know, why do I do that? But I find it much better because I don’t have to worry about the plug-ins I have to install for it like Firefox or Chrome. I use Chrome for sites that run too many scripts and slow in IE. But I know each browser has their flaws and I hope there is a better way to fix it instead of using…[Read more]
-
Neil Y. Rushi wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 7 months ago
Here is another example of why the government, the health industry, cyber security experts and device makers should come together – medical devices have evolved to be considered Internet of things (IoT) and need […]
-
Neil Y. Rushi commented on the post, Progress Report for Week Ending, September 29, on the site 6 years, 7 months ago
I wish I had one just so I could witness this – just to see what triggered it
-
Neil Y. Rushi commented on the post, Progress Report for Week Ending, September 29, on the site 6 years, 7 months ago
I agree this should be seen as a warning because ransomware is no joke and glad this was done early so we can expect some things in the future but the story is amusing lol.
-
Neil Y. Rushi commented on the post, Progress Report for Week Ending, September 29, on the site 6 years, 7 months ago
RIght? That’s what I was thinking but maybe it was a way to disturb other websites who use github for their coding?
-
Neil Y. Rushi commented on the post, Progress Report for Week Ending, September 22, on the site 6 years, 8 months ago
This is pretty cool – I use private browsing sometimes and I never knew about the data leaks. I hope this comes out soon.
-
Neil Y. Rushi wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
GitHub is a code hosting website and someone or some group managed to find a misconfigured Memcached server(s) and spoofed an IP Address to create the DDoS event. The attack caused over 1.35Tbps of data, which is […]
-
Neil Y. Rushi wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
People who bought HP laptops had a free keylogger program installed but it wasn’t on purpose. A user found out while troubleshooting it, but by default it was turned off. The user contacted HP and they applied a […]
-
Neil Y. Rushi commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 8 months ago
I like the title for this post – it’s clever! And I can see that happening since the epidemic is causing many problems and when doctors and nurses are rushed, they will ignore protocols. As hospitals are usually targeted by hackers, this situation will definitely not help.
-
Neil Y. Rushi commented on the post, Progress Report for Week Ending, September 22, on the site 6 years, 8 months ago
Thanks Fred, this will definitely help!
-
Neil Y. Rushi wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
I found this article a week ago and I thought it was interesting since I know at my job, other companies and even Temple students use Google Chrome for work or personal use. The malware would ask users to call a […]
-
Good article, definitely something to be aware of. Every time I read the words Google Chrome, I automatically think “leeches.” They collect more data than any other browser and it is like they need your data to survive just like a leech needs blood. I try to avoid using Google Chrome as much as possible. When I initially read the title of the article, I was like “another reason to not use Google Chrome.” After reading the entire article, other browsers can be affected too. I have heard of this scam before, but I know for a fact the users were not using Google Chrome as their browser. I am pretty sure my dad has experienced this scam once or twice and I had to help him with it. I am wondering if there is a better solution. My dad has experienced this a few times and it would be nice if there was something better other than “use the task manager to end task and terminate the browser.”
-
I mostly use Internet Explorer – I know, why do I do that? But I find it much better because I don’t have to worry about the plug-ins I have to install for it like Firefox or Chrome. I use Chrome for sites that run too many scripts and slow in IE. But I know each browser has their flaws and I hope there is a better way to fix it instead of using Task Manager like you said.
-
-
Pretty interesting article Neil. Chrome is definitely something more than 40% of consumers use in their daily lives and it is quite bizarre to see Google saw this much later. Not sure how many consumers were already duped of this. Though I haven’t faced this ever before in Google Chrome, but did face it in other web applications that I use for social media. I would rather be careful next time and not to share any personal information with anyone claiming to be from an authentic source, unless validated. Thanks for sharing this!
-
-
Neil Y. Rushi commented on the post, ICE 5.1 Telling a Story through Visualization, on the site 6 years, 8 months ago
You talk about this subject and this is especially true when using online dating sites like OKCupid, Tinder, Match, etc – since sometimes you can validate the person, but is there a system or something running that validates the account that makes a person fall for catfishing?
-
Neil Y. Rushi commented on the post, Progress Report for Week Ending, September 22, on the site 6 years, 8 months ago
I’ve never really listened to podcasts, but I will give this a try. It will be nice to hear some experts on this subject. Thanks Andre!
-
Neil Y. Rushi wrote a new post on the site MIS 5212-Advanced Penetration Testing 6 years, 8 months ago
In my forensics class, the professor talked about how a forensics expert solved cases to put the murderers away but later found he was incorrect. So the people sent to jail were freed. This can damage the […]
-
Neil Y. Rushi commented on the post, Amazon to Let Delivery Drivers Open your Front Door, on the site 6 years, 11 months ago
This sounds great and if implemented properly by both Amazon and the customer, there are ways to mitigate the risks. Anyone with a security system such as Ring can see when Amazon made the delivery. The cloud cam is a good idea as it can track the delivery driver. I think as time progresses, they can modify it and it may become stronger in terms…[Read more]
-
Neil Y. Rushi commented on the post, Blackberry and the future, on the site 6 years, 11 months ago
After I read this article, it was cool to hear that blackberry was trying to implement its software and technology to something other than phones. I don’t think they should get back to the phones just yet as it looks promising they can niche for themselves in other industries for technology.
-
Neil Y. Rushi commented on the post, Discussion Week 12, on the site 6 years, 11 months ago
I see your point Donald, I overlooked that fact about TCP being a regulator of traffic and the dropped packets. It is essential to an organization who monitors network traffic to see if the packets received were supposed to come through were reported as spam and vice versa.
-
Neil Y. Rushi commented on the post, Discussion Week 14, on the site 6 years, 11 months ago
Discussion Topic 14.3 – I would report my findings as needed, regardless if the new programmer is the relative of the VP. The VP can offer whatever he wants but in the end, the integrity of myself is more important than more money. In the world of cyber security, we don’t want to encourage people who break the law and not comply with IT laws.…[Read more]
-
Neil Y. Rushi commented on the post, Another Facebook Bug Allowed Anyone to Delete your Photos, on the site 6 years, 11 months ago
Quick response by Facebook to fix the bug and it’s interesting to see bug bounty hunters.
-
Neil Y. Rushi wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 6 years, 11 months ago
In this article, it speaks about how Blackberry is looking to add security to various industries. It also has the capability to provide more security and help governments than Apple or Google, which sounds good […]
-
With all the competitors around. Blackberry should have something outstanding to other phones to be able to make a comeback.
-
Hello Neil,
That’s an interesting article to share and learn. Blackberry’s case if quite interesting because it uses one of the most secure operating systems that is quite closely connected to the internal networks. Despite this the threat of cyber-attacks has become so common that companies need to constantly change and implement new security patches. It just a matter of hope to see blackberry turnaround. -
After I read this article, it was cool to hear that blackberry was trying to implement its software and technology to something other than phones. I don’t think they should get back to the phones just yet as it looks promising they can niche for themselves in other industries for technology.
-
- Load More
I definitely agree to this article that medical industry needs an overhaul and a complete change in the way security is handled at different levels. Handling alone might not be useful and all stakeholders including governments, doctors, and cyber experts need to come together to form a partnership on implementation of cyber security.