-
Roberto Nogueda posted a new activity comment 7 years, 11 months ago
Hello Jimmy- this is a great article and also alarming and scary.
There are some smarts to it and the type of approach used to present the ransomware, however this can be used as an example of sophistication and elegance to hack.
Thank you for sharing.
Roberto.
-
Roberto Nogueda posted a new activity comment 8 years ago
Hello everyone- so I did this lab twice, once in my work computer and now in my personal computer. The second time was a lot easier and faster, because everything is available to you in Windows server, so my recommendation is to search on line how to create Raid 5 or mirror volumes on line, but once all 5 hard drives are created, launch your…[Read more]
-
Roberto Nogueda wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Hello class- while looking for something to write about I came across this article and thought I should share with you.
The New York Times has a Tech Tip section, and this week’s part by J.D. Biersdorfer w […]
-
Roberto Nogueda commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Hello Mengxue/class- this is a very interesting article that raises good questions about physical and logical security.
We all know that ATMs are protected and the money is also insured so the big question is Why European banks can better their systems and make ATMs more secured?
-
Roberto Nogueda commented on the post, Trump's Email Servers!?!?!, on the site 8 years ago
hello Jimmy/class- in a radio show on my way to work i head the reported touching about this incident and how the version of Microsoft server has not been patched in over a year. at his conclusion and I think it was brilliant he mention “Mr. Trump, instead of worrying about the Mexican wall, you should worry about your firewall.”
-
Roberto Nogueda commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Hello Ioannis/class- this is another example of the amount of power that could be used for a good cause and not negatively. I first saw this article this morning and I was not surprised to learned that the amount of connections pointing to a single nude can create a significant DDOS attack, but this looks like hackers are using more sophisticated…[Read more]
-
Roberto Nogueda wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
We were under attack- said the New York Times in today’s edition, based on users’ reported sporadic problems reaching several websites including Twitter, Netflix, Spotify, Airbnb, Reddit, Etsy, SoundCloud and The […]
-
Roberto Nogueda posted a new activity comment 8 years ago
Hello Wane/class- this is a good article and it provides a great overview of the security lacks on existing technologies we have now a days.
The creation of software that is hard to exploit is just a great example of the need of security, but it also shows how behind we are to make everything else secure.
You also mention the internet of…[Read more]
-
Roberto Nogueda commented on the post, U.S. formally accuses Russian hackers of political cyber attacks, on the site 8 years ago
Hello Mauchel/class- this is one of the biggest fears for any country in the year of elections, not only the US.
As we hear more about evidence that Russia has the capabilities of potentially temper a presidential decision, we as nation should prioritize resources to stop that from happening. Our democracy and privilege to elect a president…[Read more]
-
Roberto Nogueda posted a new activity comment 8 years, 1 month ago
Hello Mengqi- this is a very informative article that reminded me the hackes commited by Alberto Gonzalez, back in 2006 – 2008.
Gonzalez was sentenced to 20 years in prison for stealing millions of dollars in credit and debit cards information from TJX, parent company of TJ Max, and Ross (I think).
Even though we see that technology is…[Read more]
-
Roberto Nogueda posted a new activity comment 8 years, 1 month ago
hello Anthony- I kind of agree with this article because some companies don’t want to spend the money in security to protect their customers and clients.
I was reading an article this morning that mentioned that a typical cost of a bridge was about $200,000 and that most cyber events cost companies less that 0.4 percent of their annual revenue…[Read more]
-
Roberto Nogueda commented on the post, Student legally hacks airline and earns $300,000 of miles, on the site 8 years, 1 month ago
hello Jason- this is a great article and one more example for all of us to follow. Many companies are dedicating and allocating rewards to those that can find the zero-day vulnerabilities in software, and the pay is quite attractive.
I wish I could be more proficient and daring so I could win some money from my skill set.
-
Roberto Nogueda wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
So we will be getting the touch and feel of the newest Google browser that will flag “not secured” any non-HTTPS sites that transmit credit cards information and passwords, as of January 2017, called […]
-
Google has the difficult position of balancing user experience with security. If other browsers don’t follow, users may notice they can use a site just fine in their competitor and switch, ignoring the fact that Google is just trying to keep them safe. Google for example could demand two step verification if it knows you own a smartphone but for many they consider security a hassle. I do know another change that Google has started is recommending difficult passwords when you create an account on any websites and offers to remember it for you.
-
I think this is a smart move by Google. Admittedly, I don’t always check to see if HTTPS is used when processing a payment. I usually will if it is a site I’ve never used before, but I like the idea of this added Chrome functionality that will warn me. I also think they should warn users if older, non-secure versions of SSL/TLS are being used by the website. This also creates a risk.
-
-
Roberto Nogueda wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
reconnaissance-report
trillium-technologies-inc_-by-roberto-nogueda
reconnaissance-report
-
Roberto Nogueda commented on the post, How did FBI hack terrorist's iPhone? News groups sue to find out, on the site 8 years, 1 month ago
Hello class- I agree with all of you and I think that our government agencies should disclaim all the tools available to them and make things transparent to the public.
Some of the other tools available to them, like Black Widow, and RedSeal are so dangerous in the wrong hands, but who polices those who use tools for the wrong purpose in those…[Read more]
-
Roberto Nogueda posted a new activity comment 8 years, 1 month ago
I am not surprise to learn that DDoS is becoming even more popular, it’s like the old say, if it works, keep riding it.
The reason why we keep hearing about these attacks is because more people are becoming evil and learning the negatives of how to user and respect computer systems, butd they keep forgetting that sooner or later, they will get…[Read more]
-
Roberto Nogueda posted a new activity comment 8 years, 1 month ago
Hello Noah- this is a great example of how technology is shifting to a new direction and how appliances that costed thousands of dollars at one point, they are worth hundreds or less now.
Cloud computing and the migration to cloud based technology is growing so fast that in a few years it’ll become the standard, the question is: is it better…[Read more]
-
Roberto Nogueda wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
Here you go hackers, if you want to make up to $200 k, here is the way.
The project Zero Prize is a way for participants to find a full exploit that will allow them to achieve remote code execution on […]
-
Nice article Roberto and I agree with Natalie Silvanovich. Additionally, a similar approach can be emulated to combat ransomware. This is a solution that can invite and encourage hackers to work with companies from all industries in an effort to minimize unethical hacking. Especially, companies in the healthcare and financial industries should take note of this method to gain information about how malware bugs and systems exploits work.
-
If this is something that interests anyone, there is a free emulator for android that allows you to exercise a phone in a software environment. There was a nice presentation at Shmoocon a few years ago. Pretty sure it was recorded and put on youtube.
Wade
-
-
Roberto Nogueda wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
The latest research released this week by Ben Gurion University in Israel reveals the findings of 911 systems been potentially in danger that could overwhelm a complete state’s 911 system with endless calls, by u […]
-
Roberto – That’s a very interesting article. I think Cyber Security is a bit underrated due to its potential to cause catastrophic consequences. This is one of the reasons I got into this field to hopefully help raise the awareness of a myriad of threats and risks. North Carolina’s appointed officials should take this seriously and implement a effective solution as soon as possible. May this be a wake up call for all other states.
-
We posted same thing! Roberto. But the article I looked at missed the North Carolina research part. I think this should be a issue that PCC should take a serious look at because DDoS attack is relatively simple and 911 is so important that related to people’s lives. They should hire experts to implement call firewalls and figure out some solutions to further control the problem. Fortunately, researchers find out it first instead of hackers. They still have time to do something before tragedy happens.
-
I’m interested to know what a managed IP network is and how it would prevent a DDoS attack. The article mentioned eliminating the calling protocol that’s in use as if that would solve the problem. I know websites are vulnerable to DDoS attacks so what about managed IP network makes it so safe?
I did a little research into the matter and found that managed IP networks are communication networks that are planned, built, and managed by a third party. Perhaps these would be more resistant to DDoS attacks, but I believe with enough bots attacking the system, the service would still be denied for at least some users. I think distributed denial of service attacks are so dangerous because you can’t simply block one device to rectify the problem. Each device is acting normal despite the fact that its being controlled by a third party, so it is difficult, if not impossible to determine which devices are bots and to block them effectively.
-
-
Roberto Nogueda posted a new activity comment 8 years, 1 month ago
Hello Mauchel/class- This type of situations are completely outrageous. I can’t believe Wheels Fargo didn’t noticed about this nation-wide scam before, let alone getting rid of only 5300 people.
I am so glad that i don’t have this as my bank but we should look close to those we have businesses with and see of something like this or similar…[Read more]
- Load More