@shain-r-amzovski
Active 3 years, 5 months ago-
Shain R. Amzovski wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
This past Wednesday, private information about international athletes leaked on the internet. This information was allegedly leaked from the World Anti-Doping Agency, and included 25 medical drug exemptions […]
-
Shain R. Amzovski commented on the post, Finally an indicator that you’re on an unsecure site, on the site 8 years, 1 month ago
I thought this in an interesting article. Although they are not guaranteeing that these sites will be free of malware, they want to let users know that there is an added layer of security when going to an HTTPS site, as opposed to an HTTP.
-
Shain R. Amzovski commented on the post, Question for this week, on the site 8 years, 1 month ago
The NSO Group claims its “mission is to make the world a safer place by providing authorized governments with technology that helps them combat terror and crime.” I believe this is not entirely true, and the company was offered enough money by the UAE to assist with monitoring human-rights activists and report information back to the gov…[Read more]
-
Shain R. Amzovski commented on the post, Weekly Question #7: Complete by March 27, 2017, on the site 8 years, 1 month ago
I agree with the Judge’s ruling that if the FBI or other government agency hack a computer for investigative purposes, they should obtain a search warrant from a local magistrate. If an agency has the ability to access a computer’s file system, and have the ability to look at history, etc., they should have to go through the same process as if a…[Read more]
-
Shain R. Amzovski posted a new activity comment 8 years, 1 month ago
Scott,
This is an interesting article. The first time I had read about this device was because it was trending on Facebook. Within a matter of seconds, a USB can destroy a computer. The company claimed this is necessary for proper IT security because companies should have their USB ports disabled on public machines. It seems as though Apple…[Read more] -
Shain R. Amzovski wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
A pair of 18-year-old Israeli teens were arrested for operating a hacking tool, that created a DDoS (Distributed Denial of Service) attack, and would flood sites with so much malicious internet traffic that they […]
-
It’s a shame really, although they caught these guys, there are still so many people out their that sell these type of services. They are available all over the darkweb. Nothing the authorities can do other than to continue looking for these types of people, but even if they end up being caught, there are other alternatives.
-
Shain,
Very interesting article. This is very scary that someone can now just pay to perform a DDoS attack without having any hacking knowledge. This can lead to many organizations across the world getting attacked because of something like this. Once again this goes to show how the constantly evolving security landscape can be harmful to both large and small organizations.
-
Yanni,
That is crazy they were teenagers and the money they made to attack these websites. I have never heard of a booter service before, I will do more research on that.
-
-
-
Shain R. Amzovski commented on the post, Hacker Wisdom: Top Three Takeaways from Black Hat 2016, on the site 8 years, 1 month ago
Roberto,
Thanks for sharing this article, it had some interesting insights. I was not really surprised by the findings of Bursztein’s experiment. Quite frankly, I believed the results would be higher than 46%. I like the comparison he made to finding food on the ground. You would not pick it up and eat it because it could poison you, so why…[Read more] -
Shain R. Amzovski commented on the post, Article: “Car hacking is the future – and sooner or later you'll be hit”, on the site 8 years, 1 month ago
Mengqi,
This is an interesting subject, that will get more attention in the years to come. With Google and Uber experimenting with self-driving cars, the opportunity for hackers to gain access to these self-driving automobiles and cause trouble on the road is increasing. I recall reading an article regarding the Jeep-Fiat hack last year,…[Read more] -
Shain R. Amzovski commented on the post, How Spy Tech Firms Let Governments See Everything on a Smartphone, on the site 8 years, 1 month ago
Ahmed, I agree. Where do we draw the line with this subject? If there is proof that this software has foiled numerous terrorist plots, then I am okay with the surveillance. If there is no evidence that this software has made a difference in stopping attacks, then it just violates our freedom and privacy. I believe this software also violates…[Read more]
-
Shain R. Amzovski commented on the post, Former St. Louis Cardinals Exec Sentenced To 46 Months For Hacking Houston Astros, on the site 8 years, 1 month ago
Also, many professional sports teams are NOW resorting to Big Data Analytics to assist with scouting* I noticed a typo after I posted.
-
Shain R. Amzovski commented on the post, Former St. Louis Cardinals Exec Sentenced To 46 Months For Hacking Houston Astros, on the site 8 years, 1 month ago
Brent,
This is an interesting article. Contrary to what many believe, hacking does not require a ton of technical knowledge, or sophisticated hacking techniques to gain control of a system. Employees should seek permission to wipe their personal laptops prior to leaving a company. Also, it is never a good idea to reuse passwords. I agree, if…[Read more] -
Shain R. Amzovski wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
This article is interesting because it shows how Cyber-Security firms, or Spy-Tech firms are using their technology and marketing their products to governments around the world. This particular Spy-Tech company […]
-
I was hoping someone would post one of these articles. The question I would like all of you to consider is where do you draw the line. Some level of surveillance is necessary, but at some point it goes to far. This is a conversation that still needs to take place in our society..
-
This is an interesting article, Shain. Obviously, what NSO did should not be considered as ethical hacking. The NSO maintained access to the target, used covert channels, exfiltrated data from target’s phone, and also covered its hacking tracks. It went to far beyond ethical hacking. However, I think it is necessary for a country to have certain level of surveillance over the entire network in the country to protect its people from potential terrorism activities, as long as information of persons under surveillance will not be published. What I worry about is that the hacking method and techniques used by NSO now will be developed and be able to be used to attack everyone, like you and me, someday in the future. Since people make increasingly transactions through mobile phones and increasingly rely on mobile phones, mobile phone security is becoming extremely important to everyone.
-
There should be Government surveillance conducted to an extent. The Government shouldn’t have the ability to use any of these tools willy nilly. It worries me that these private companies are selling their tools to countries around the world. This has become a profitable industry spurring even more competition. We will eventually see these tools get used by the wrong hands. Although NSO claims to have a “strict internal vetting processing” to determine their customers, what stops them from selling to other organizations in the future if the price is right?
-
Shain,
Great article. Unfortunately in the age we live in people use technology not only to make their lives more convenient but also to make criminal lives more convenient. With an organization like this available now it might shed a light on just how vulnerable our most personal devices are.
-
Ahmed, I agree. Where do we draw the line with this subject? If there is proof that this software has foiled numerous terrorist plots, then I am okay with the surveillance. If there is no evidence that this software has made a difference in stopping attacks, then it just violates our freedom and privacy. I believe this software also violates the 4th Amendment of the Constitution for unreasonable search and seizures. No warrant is needed, and the user has no knowledge that any personal data is being captured from their device. After 9/11, with laws passed, such as the PATRIOT Act, this subject has been iffy, and there is not really a clear line on what is okay, and what is not.
-
-
Shain R. Amzovski changed their profile picture 10 years, 9 months ago
-
Shain R. Amzovski commented on the post, Q&A: WalMart, on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 5 months ago
It is a good idea for WalMart to open up convenience stores in urban areas because people who live in urban areas for the most part do not own a car, so they would have to have a store where they can get most of […]
-
Shain R. Amzovski commented on the post, Q&A: Final thoughts (100 section reflection on the course), on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 5 months ago
Overall, I enjoyed the course. I learned a lot about how businesses can become more successful than others based solely off of the way they distribute their product. Every successful company today is backed by a […]
-
Shain R. Amzovski commented on the post, Q&A: 100 second reflection for week 13, on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 5 months ago
In week 13, we learned about the WalMart case. From this case we learned that WalMart has a very efficient supply chain. The supply chain allows walmart to distribute to the stores faster and keep the shelves […]
-
Shain R. Amzovski commented on the post, Q&A: 100 second reflection for week 12, on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 5 months ago
The simulation showed us what goes into developing a product. There are many phases such as modeling, forecasting, and other costs to look at. You also want to look at where the items are produced and how long […]
-
Shain R. Amzovski commented on the post, Weekly Question #5: Complete by February 25, 2016, on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 6 months ago
In week 10 something I learned was how important standards are to a business. Today, businesses do most transactions online, which requires companies to have the same standards as one another so that information […]
-
Shain R. Amzovski commented on the post, Q&A: 100 second reflection for week 10, on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 6 months ago
In week 10 from the Starbucks case, I learned that supply chain decisions can be affected by environmental decisions and ethical decisions that companies have to make from time to time. Today, companies have […]
-
Shain R. Amzovski commented on the post, Q&A: Ethics and Environment, on the site Internet and Supply Chains – MIS 3537 Spring 2013 11 years, 6 months ago
I would not pay the carbon credit. I did an individual calculator and it came to over 100, for my household it would cost roughly $500. The carbon credit seems to be pointless because people could reinvest that […]
- Load More
I found it interesting that the article seems to imply that Russian cyber attacks are occurring to divert media attention away from media negativity surrounding Donald Trump. That seems like a strange motive to me, especially for this attack on athletes. I would agree that the attacks on the DNC e-mails and other recent leaks about Hillary Clinton are politically motivated, but this one seems like a reach.
Yeah its a bit strange that athletes who put on so much efforts are even not spared from such cyber attacks.The WADA (world anto doping agency ) has actually confirmed that Russian cyber espionage group Fancy Bear, which is also known as Tsar Team, accessed the Americans’ data through an International Olympic Committee account created for the Rio Olympics by spear phishing email accounts to obtain passwords to its database
The group released information on four American athletes — Simone Biles, Elena Delle Donne, Serena Williams and Venus Williams on their website.
Shain,
Great article. This goes to show how any organization is vulnerable to attacks such as phishing. Even though it isn’t known who did the attack it is a bit tough to not overlook Russia as a possibility based on the relationship they had with WADA and the Olympics in Rio. WADA should learn from this attack and try to train their employees for phishing attacks to prevent this from happening in the future.
Shain,
I read article that related to Fancy Bear as well. They also leaked American athletes–Simone Biles and Serena Williams’ medical records. Both reports indicated that they were doped during the Olympic game but the anti-doping agency didn’t mention it. They had to explained to the public that those medicines didn’t count for prohibited drugs. I don’t know who is right, but I still hope Olympic can be hold under a fair and honest environment.