-
Scott Radaszkiewicz commented on the post, Week 2 Update, on the site 5 years, 11 months ago
This reminds me of GPS, which was invented by the government in the 1970’s. When it start to become available for commercial use, there were security concerns. They didn’t want someone putting a GPS locator in a location and then being able to direct a missile directly to it! So, in its early form, GPS had built into it Selective Ava…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 2 Update, on the site 5 years, 11 months ago
Hi Fred,
One of the biggest problems with Iot is that it just doesn’t affect organizations, they are now targeting homes. And we all know that the majority of home users take their router out of a box, plug it in, and it works. They are happy, and that is the end of it. They don’t change the default password, which is easily obt…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 3 Update, on the site 5 years, 11 months ago
Very interesting article Vince. I was looking at some VM encryption about a year ago. I never got around to testing it out. I was very curious about the performance impact on the VM itself. Seems like in your test, there was very minimal impact. I was looking at storing a Virtual Server offsite for DR. Looking at encryption was one of…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 3 Update, on the site 5 years, 11 months ago
Brock, when I first heard about how they were getting into ATM’s, I too was very surprised to find that the ATM systems were relying upon Windows. I would have bet anything that it was using some flavor of Unix/Linux as the OS. You’re right on target, the best way to stop these attacks is beefing up the physical security at the ATM.…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 3 Update, on the site 5 years, 11 months ago
Thanks Frederic, a good post. We have an imaging process at our work to deploy workstations. We routinely run Powershell scripts to configure our workstations. Powershell is such a useful utility that most people don’t know about. With a little time and practice , you can really use it to your advantage! Just test what you’re doing first,…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 5 years, 11 months ago
Thanks Bilaal. Yes, finally going to see the end of Flash in 2020. It can’t come too soon. Recently Google announced that the Chrome Browser would default to HTML5 when possible, and Google has banned Flash from any of it’s display ads. The problem is that so much is built on flash that it just can’t be killed off! So many websites…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 5 years, 11 months ago
A client that I help support actually got his with this CoinMiner Malware last week. They had contacted me telling me things were running real slow on one of the systems. I connected in, and after a few minutes found this .exe file that was consuming 80-90% of the system resources. Some research showed that it was a bit coin mining malware…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 5 years, 11 months ago
I think the biggest thing hurt here is Apple’s feelings! It’s iOS 9, and a bit old. I’m sure the code will give some insight into how Apple iOS is built and might allow hackers to hack later systems, but to me, Apple got a black eye on this. Their precious secrets are out in the open.
-
Scott Radaszkiewicz commented on the post, Week 4 Update, on the site 5 years, 11 months ago
Very interesting article. Faraday cages have been around a long time. I read the article, twice in fact. I’m jammed up on the fact that they say in the article “Once a computer is infected”. So this is not really breaking into a computer that is protected by a Faraday Cage Air-Gap, it’s getting the data off of it.
If you do it right,…[Read more]
-
Scott Radaszkiewicz commented on the post, Progress Report for Week Ending, March 15, on the site 5 years, 11 months ago
I agree with you Duy. Companies fear the outcome of releasing information that they were hacked. I think, unfortunately, that the government is going to have to step in and create laws around when/what/how a company informs clients of a data breach.
I work in K-12 education. There are laws in place already that I have to follow if we know…[Read more]
-
Scott Radaszkiewicz commented on the post, Progress Report for Week Ending, February 9, on the site 5 years, 11 months ago
Good article Matt. Personnel are always the weakest link in any security plan. You could invest resources into securing your infrastructure the best that you possibly can, but there is no way to force an employee to follow what you have implemented. Just one employee who, either intentionally or unintentionally, does not follow protocols,…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 11 Update, on the site 5 years, 11 months ago
Really interesting article Jason. That’s a staggering number! $50 Million. And guess who that loss gets passed onto, not the companies, but the consumer.
It’s a brave new world, and as much as the digital age has made our life easier, it will also make life easier for thieves! They don’t even have to leave their house in this world to…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 11 Update, on the site 5 years, 11 months ago
Great article Satwika. Some very simple and useful tips for people to follow. The problem is that you have people who know nothing more then how to plug in their router and connect their WiFi device to it. You would be surprised to see how many people don’t change their router password! I’ve even seen routers setup in business with default…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 12 Update, on the site 5 years, 11 months ago
Very interesting Vince. I read about this before. With backers like Microsoft and Google, I’m curious to see how this is going to play out over the next year. It certainly is an interesting concept of a password free world.
-
Scott Radaszkiewicz commented on the post, Week 13 Update, on the site 6 years, 7 months ago
Windows Servers Targeted for Cryptocurrency Mining via IIS Flaw
Hackers are using CVE–2017–7269 to take over servers. This is a vulnerability discovered by two Chinese researchers in March 2017 that affects IIS’ WebDAV service. At…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 12 Update, on the site 6 years, 7 months ago
Very interesting Vince. I read about this before. With backers like Microsoft and Google, I’m curious to see how this is going to play out over the next year. It certainly is an interesting concept of a password free world.
-
Scott Radaszkiewicz commented on the post, Week 12 Update, on the site 6 years, 7 months ago
So this was my first foray into using Google Cloud Services. It was exciting to get to play with this new technology. In my brief experience with it so far, a few Pros and Cons jump out at me right away.
Some Pros:
-Quickly create a VM; a minute or two for a fully patched operational server.
-Not limited in resources, such as hard drive…[Read more] -
Scott Radaszkiewicz commented on the post, Week 11 Update, on the site 6 years, 7 months ago
Great article Satwika. Some very simple and useful tips for people to follow. The problem is that you have people who know nothing more then how to plug in their router and connect their WiFi device to it. You would be surprised to see how many people don’t change their router password! I’ve even seen routers setup in business with default…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 11 Update, on the site 6 years, 7 months ago
Really interesting article Jason. That’s a staggering number! $50 Million. And guess who that loss gets passed onto, not the companies, but the consumer.
It’s a brave new world, and as much as the digital age has made our life easier, it will also make life easier for thieves! They don’t even have to leave their house in this world to…[Read more]
-
Scott Radaszkiewicz commented on the post, Week 11 Update, on the site 6 years, 7 months ago
Google Bans Cryptocurrency Mining Extensions From Chrome Web Store
https://thehackernews.com/2018/04/cryptojacking-chrome-extension.html
Cryptojacking has been a very popular topic in the news recently. Cryptojacking is defined as the unknown use of a computing device to mine cryptocurrency. Encryption techniques are used to regulate…[Read more]
- Load More