-
Scott Radaszkiewicz commented on the post, Week 09 – Update, on the site 6 years, 7 months ago
Good article Matt. Personnel are always the weakest link in any security plan. You could invest resources into securing your infrastructure the best that you possibly can, but there is no way to force an employee to follow what you have implemented. Just one employee who, either intentionally or unintentionally, does not follow protocols,…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 5 Update, on the site 6 years, 7 months ago
I agree with you Duy. Companies fear the outcome of releasing information that they were hacked. I think, unfortunately, that the government is going to have to step in and create laws around when/what/how a company informs clients of a data breach.
I work in K-12 education. There are laws in place already that I have to follow if we know…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 6 years, 8 months ago
Very interesting article. Faraday cages have been around a long time. I read the article, twice in fact. I’m jammed up on the fact that they say in the article “Once a computer is infected”. So this is not really breaking into a computer that is protected by a Faraday Cage Air-Gap, it’s getting the data off of it.
If you do it right,…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 6 years, 8 months ago
I think the biggest thing hurt here is Apple’s feelings! It’s iOS 9, and a bit old. I’m sure the code will give some insight into how Apple iOS is built and might allow hackers to hack later systems, but to me, Apple got a black eye on this. Their precious secrets are out in the open.
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 6 years, 8 months ago
A client that I help support actually got his with this CoinMiner Malware last week. They had contacted me telling me things were running real slow on one of the systems. I connected in, and after a few minutes found this .exe file that was consuming 80-90% of the system resources. Some research showed that it was a bit coin mining malware…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 6 years, 8 months ago
Thanks Bilaal. Yes, finally going to see the end of Flash in 2020. It can’t come too soon. Recently Google announced that the Chrome Browser would default to HTML5 when possible, and Google has banned Flash from any of it’s display ads. The problem is that so much is built on flash that it just can’t be killed off! So many websites…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 3 Update, on the site 6 years, 8 months ago
Thanks Frederic, a good post. We have an imaging process at our work to deploy workstations. We routinely run Powershell scripts to configure our workstations. Powershell is such a useful utility that most people don’t know about. With a little time and practice , you can really use it to your advantage! Just test what you’re doing first,…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 3 Update, on the site 6 years, 8 months ago
Brock, when I first heard about how they were getting into ATM’s, I too was very surprised to find that the ATM systems were relying upon Windows. I would have bet anything that it was using some flavor of Unix/Linux as the OS. You’re right on target, the best way to stop these attacks is beefing up the physical security at the ATM.…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 3 Update, on the site 6 years, 8 months ago
Very interesting article Vince. I was looking at some VM encryption about a year ago. I never got around to testing it out. I was very curious about the performance impact on the VM itself. Seems like in your test, there was very minimal impact. I was looking at storing a Virtual Server offsite for DR. Looking at encryption was one of…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 2 Update, on the site 6 years, 8 months ago
This reminds me of GPS, which was invented by the government in the 1970’s. When it start to become available for commercial use, there were security concerns. They didn’t want someone putting a GPS locator in a location and then being able to direct a missile directly to it! So, in its early form, GPS had built into it Selective Ava…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 5 months ago
Executive Summary
Presentation
-
Scott Radaszkiewicz wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 6 months ago
Click for Article
There is a Zero-Day attack that works on all versions of Windows, even fully patched machines. The attack happens by opening up a Microsoft Word RTF file. The vulnerability is present in a […]
-
Scott Radaszkiewicz posted a new activity comment 7 years, 6 months ago
Anthony, very interesting article. I just had a conversation with a colleague a few weeks ago. We were discussing ransom ware. A client of his was hit with Cryptolocker and lost some very important files. They were faced with a decision on paying the ransom or losing the files. They decided that it was easier to re-create the files they…[Read more]
-
Scott Radaszkiewicz posted a new activity comment 7 years, 6 months ago
Arkadiy, the link you posted seems to be dead.
Scott
-
Scott Radaszkiewicz wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 6 months ago
Article Link
This is an interesting article. Many users install software like Symantec to help keep them safe, and here, there was a flaw that would allow an unauthenticated attacker to retrieve SSL […]
-
Scott Radaszkiewicz wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
Article Link: Click Here
I found this article very interesting. As an IT professional, I preach to people all the time about the safety of their data, and what they are doing on a PC. This is a great ar […]
-
Scott Radaszkiewicz posted a new activity comment 7 years, 7 months ago
Very interesting article Vaibhav. It’s amazing how the government considers the information of the Tor vulnerability to be a greater asset then prosecution of a child pornography case. Once can only hope that this knowledge that they are not willing to part with, will help in some greater causes! Just goes to prove the value of information!
-
Scott Radaszkiewicz posted a new activity comment 7 years, 7 months ago
Good article Jason. Over the past several years here at my organization, we have pushed users to use cloud storage vs. local storage. I work in a K-12 school district. In fact, our High School and Middle School Students have devices issued to them and they use Google Drive for all of their storage. We even tell students to create a dropbox…[Read more]
-
Scott Radaszkiewicz wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
Article Link
This article details a vulnerability in WordPress 4.7.0-1 that allows a user to change any blog post. The article takes you step by step through the process of exploiting the vulnerability.
I […]
-
Scott Radaszkiewicz wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
Metasploit Analysis – Executive Summary
Metasploit Analysis – Powerpoint
- Load More