-
Noah J Berson posted a new activity comment 8 years, 1 month ago
“The Department of Transportation just issued a comprehensive policy on self-driving cars”
Autonomous Vehicles (AV) are an emerging industry where many manufacturers think they will have decent capabilities by 2020. The Department of Transportation (DoT) has decided to not lag behind the times and release an intial framework for how they think…[Read more] -
Noah J Berson posted a new activity comment 8 years, 1 month ago
The information risk profile is the portfolio of all the identified IT risk that the enterprise is exposed to.
This is really important since it weighs the impact of the IT investments a company can make. This allows executives to make decisions based on the likehood of success and the perils of failure. The goal of the decisions is to reduce…[Read more]
-
Noah J Berson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Sometimes aspiring Pokemon masters want that extra edge to their game and go looking for guides on how to play the game better. Looking in the Google Play Store may have led the players astray as one guide was […]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
The knowledge to keep up security is compounded year after year, making it extremely hard for small companies to even feel safe except by obscurity. I think we’re going to see a lot of companies spring up like this who perform one cyber-security function and sell it.
I also have a hard time understanding what Cato is trying to do. It sounds…[Read more] -
Noah J Berson posted a new activity comment 8 years, 1 month ago
I wish the article went more into the guts of these systems. The tone is almost of a battlebots competition more than of a game of chess. It is hard to tell if they are coding brand new services from scratch or if they already know what a secure framework is supposed to look like in general then working from there to make new code. I’m sure the…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
For the legality, it is possible to argue that this is not insider information. It is close to a “short and distort” but that has the intent that the rumor they spread is false while in this case the flaw is true. We are also not dealing with pure financial information as the information doesn’t guarantee a rise or fall in the stock, although it…[Read more]
-
Noah J Berson commented on the post, Obama signs two executive orders on cybersecurity, on the site 8 years, 1 month ago
I think its important to look at the motivations of each organization. The new government entities will have a mission to protect data first, while in business the first mission for security will still be protecting shareholder value. Considering that we have read news of companies hiding massive data leaks often for years, it may be time to have…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
I don’t think that to respond to a vulnerability we remove the feature entirely. For most companies, losing a terminal is not losing data. They would respond to someone smashing the computer with a hammer the same way. Since the user needs physical access, other controls like monitoring who can use the computer or video surveillance means you’d…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
There used to be a hard rule that you don’t enter your username and password in another location but the site intended. Now with Facebook, Google, and Twitter trying to be single-sign on services for the entire internet, The average user is now signing into other sites with a friendly button that says for example “Sign in with Facebook!” This is…[Read more]
-
Noah J Berson commented on the post, Federal Judge: Hacking Someone's Computer Is Definitely a 'Search', on the site 8 years, 1 month ago
I know how straight forward an answer this seems, but the legal system is always a bit slow to adapting to new technology. The slowness has to do with how even simple terms like “search” need to have a specific definition that has multiple tests that would hold up in a court. Another debate in law that is similar is if smell is enough for probable…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
The government recognizes that other organizations may benefit from geospatial data it has collected. An issue arises when some of that data is considered sensitive, so guidelines were put in place before being allowed to publish the data. These change the way the data appears to users. The two information security objectives that could be at…[Read more]
-
Noah J Berson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Alleged vDOS Proprietors Arrested in Israel
On some corners of the internet, you can pay for services that attack legitimate websites to try to disrupt their service. One of these sites, vDOS, was recently […]-
I find it interesting that they gave them selves away through Facebook. Reminds me of the story from a few years ago about the drug smuggler who came to the attention of authorities when he posted pictures of his money counting machines,
Wade
-
I think it was interesting that cyber attackers were unaware of the risk of exposing themselves on social media. They should have the knowledge of how social media can leak personal information through either users themselves or malicious hackers. They didn’t even cover their tracks carefully and clean their attack logs frequently. One thing I was surprised was it took 4 years to catch the two young vDOS proprietors, which it was much longer than I thought. I don’t know if it is true that it usually takes so long to catch cyber attackers.
-
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
It seems that “whaling” is the technique the hackers are using, a term for a phishing scam targeting large companies. I think one of the best things to watch is when the script gets flipped in a scammers face. There is actually a collection on YouTube of people wasting phone scammer’s time trying to hack into virtual machines that are clean. It…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
I feel a bit hopeful knowing that the President doesn’t get to make a lot of technology calls. Obama was stuck with a Blackberry for years. He has finally upgraded to a smartphone, but it is so locked down that it can be considered a dumbphone. It can’t do pictures, music, or texting at all. I believe the staff around the President will be able to…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
Chrome is also my first line of defense. There are several tools that stop malicious scripts from running automatically, pop-ups taking over the browser, or just obnoxious ads that hijack a page. Chrome’s default blocking of malcious sites can be wrong sometimes but I will never click through on a machine I care about. Those flags usually appear…[Read more]
-
Noah J Berson commented on the post, Hacking Air – Gapped Networks, on the site 8 years, 1 month ago
This article makes me want to keep all critical servers either in space or deep in the ocean. That seems like only safe method to defend against this style of vulnerability. I do remember reading that Microsoft was working on underwater servers called Natick. These can be deployed just off the coast and last for years ideally. The hacker would…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
Hackers claim to have stolen important hacking tools straight from the NSA. This group, calling themselves the Shadow Brokers, have decided that its more profitable to sell the tools than to keep this hack secret to themselves. Being the only ones who know of an exploit can earn a bad guy a lot of money. The group has set the asking price at…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
I was going to bring that study up but see you already mentioned it. I’ve seen other studies conducted where the percentage was extremely high, The one I’m linking below shows that the Department of Homeland Security found 60% of ‘dropped’ flash drives plugged in. I think people see them as if someone dropped a wallet and want to check to see if…[Read more]
-
Noah J Berson posted a new activity comment 8 years, 1 month ago
ITACS students are a great vulnerability to Temple University. Vacca points out that power users, in this case students who have just started an advanced program, may know enough to install software while ignoring security policies. Bad guys looking to exploit vulnerabilities will target these users to get access to a network (Vacca, 4). Unless…[Read more]
-
Noah J Berson joined the group MIS4596-002 Spring 2016 – Messina 8 years, 9 months ago
I am actually surprised that only 6,000 infections are “live” even though the app has only a half million installs. It is very interesting and scary to hear that the malware is smart enough to not activate itself and do anything detrimental until it is “calling the shots” and 2 hrs have passed. One has to wonder what other malware is hidden in the android playstore.
We do not cover it in this class, but there is a whole discipline of reverse engineering malware. We will talk very briefly about some anti-forensics techniques in the second semester, but it is a technical subject that requires a lot time and study. It also helps to have experience as an assembly language developer.
Wade
I played Pokemon Go for a while, and I downloaded another app that could help me to find the exact position and Pokemon. I think I read another article coupe days ago, it also mentioned Pokemon Go was a major game that hackers used to spread malware. It is a very popular game now, and players all want to get better Pokemons. Therefore, a lot of them will ignore the danger of malware. It is really hard to protect us from this kind of attractions .