-
Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
Researchers in Israel have found major security holes in millions of Samsung IoT devices, Televisions, Refrigerators, Washer and Dryers and any other device running Samsung in-house OS called Tizen. Tizen is […]
-
Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 7 months ago
The original cloud service “FTP” is on the radar of many hackers. The FBI sent out an alert to medical and dental entities warning them to secure their FTP servers. Hackers are trying to access protected hea […]
-
This was a concern raised at my job this week due to the nature of information we deal with daily. Cyber criminals are trying to make connections to FTP servers in anonymous mode to allow write access to inject malicious tools. Preventive measures include checking FTP servers running in anonymous mode.
-
-
Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 8 months ago
Executive Summary
Power Point
-
Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
At least 76 popular iOS apps found to have risks for data interception. At the time of the findings, more than 18,000,000 apps downloaded from Apple’s App Store. Popular apps such as Snapchap and various banking a […]
-
Hi Wayne,
Thanks for posting this interesting read. I got a little curious and tracked down the list of 76 apps that was mentioned in the article which is provided in the link below. Most of the low priorities app, I’ve never even heard of and unfortunately the Medium/High risk were not disclosed. It also provided a list of past occurrences and I was surprised to see CISCO WebEx on there. I will definitely wait to see the Medium/high risks ones to see if it’s an app that I use.
-
Thanks for tracking this down Loi Van. That is pretty ironic that the app I use for this class was at one time vulnerable! I am not very familiar with the low and medium priority apps. Hopefully, the developers fix these apps or the rest are released soon!
-
-
Wayne Wilson wrote a new post on the site MIS 5212-Advanced Penetration Testing 7 years, 9 months ago
In North Whales cybercrimes are out numbering physical crimes for law enforcement. While burglary and shoplifting has seen a decrease, online crimes are on the rise. Primary targets for these online crimes are […]
-
This is the type of ripple effects the general public will face with when ransomware is not being addressed the proper way. This is now creating convenience for the bad guys. Should this have interpreted as something positive since physical crimes is decreasing? I’m not sure about this as no crime in any shape or form should be tolerated. Also, cybercrimes have the potential to be more massive and yes, the likelihood of getting caught is slimmer.
-
-
Wayne Wilson posted a new activity comment 7 years, 11 months ago
WOW!!! This is a very conniving and interesting approach to ransomware. The sad part is people will play along in order not to pay the ransom themselves. Ransomware attacks are on the rise and effecting regular everyday people daily.
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 11 months ago
burp-suite-scan Powerpoint
pgw-burpsuite Word document
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 12 months ago
In an effort to better combat cyber attacks IBM built a simulated version of the entire internet in a data center located in Massachusetts coined the “cyber range”. The cyber range is manned by former secur […]
-
Wayne Wilson posted a new activity comment 7 years, 12 months ago
Very interesting article, Microsoft’s response to Tech Crunch was “Regardless of operating system, for this to work, physical access to a machine is required. So, the best defense is to avoid leaving laptops and computers unattended and to keep your software up to date.” In other words, you are on your own with this one, good luc…[Read more]
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 7 years, 12 months ago
The Internet of Things is changing how we look at securing our home networks, gone are the days of just installing antivirus software on your pc and feeling secure. We now have to look at all the devices connected […]
-
Wayne Wilson posted a new activity comment 7 years, 12 months ago
It’s good to see a company taking a proactive approach to securing their customer’s online presence. The concept of checking the password hash then comparing the hash against password hashes in their system was an excellent strategy.
-
Wayne Wilson posted a new activity comment 8 years ago
China’s government is trying to control every aspect of internet access, they pretty much want access to all data that citizens can obtain. I’m sure this will effect long term relationships with many companies currently doing business with China.
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
Here is an example of how incorporating IoT into our everyday lives could have a crippling effect on us. An apartment building in the city of Lappeenranta in Finland, had its heating system hit with a DDOS […]
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
This article is a perfect example of upper management not taking IT security seriously. Even though this article is 2 years old it shows a blatant act on Home Depot’s part not to address known security issues. […]
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years ago
nessus-vulnerabilitypowerpoint
nessus-vulnerability-word-report
-
Wayne Wilson commented on the post, Temple student: I used Target gift card to get past security in 9 buildings, on the site 8 years ago
Good article, its straight to the point and shows why physical security is an important factor when it comes to cyber security. Once someone gains access to a building mischief can began. You’re only as strong as your weakest link. No matter how great your IT infrastructure is, someone gaining access to a secure area can easily take down your n…[Read more]
-
Wayne Wilson commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Those who live in a glass house shouldn’t throw stones. You would have thought his IT team would be on point when it comes to IT security after watching what happened to Hillary. In many cases IT is always an afterthought until something goes wrong and this is a perfect example of something waiting to go wrong.
-
Wayne Wilson commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Interesting article regarding backdoors. I believe by introducing a backdoor you also weaken a link in the security chain, which defeats the sole purpose of encrypting data. I had agreed with Apples stance when the government wanted Apple to decrypt the terrorist phone. Once the backdoor is created you are now at risk of someone else exploiting it…[Read more]
-
Wayne Wilson commented on the post, Weekly Question #8: Complete by November 2, 2017, on the site 8 years ago
Perfect example of social engineering at its best. Sit back and let the end users feed you all the information you need without a care in the world.
-
Wayne Wilson wrote a new post on the site ITACS 5211: Introduction to Ethical Hacking 8 years, 1 month ago
National researchers in Australia developed a hack proof computer code called microkernel. It is the barest bone of an operating system. By keeping an operating system as simple as possible, the harder it is to […]
-
Hello Wane/class- this is a good article and it provides a great overview of the security lacks on existing technologies we have now a days.
The creation of software that is hard to exploit is just a great example of the need of security, but it also shows how behind we are to make everything else secure.
You also mention the internet of things and how it exists for things that we do, but in my opinion we should slow down, fix most of the problems we have in information and cyber security around the world before we continue to launch new and exciting thing with wholes and security-less features.
-
Hi Wayne, thanks for the post.
In this day and age “Hack-proof” code seems like an illusion. I agree that making things simpler also makes it easier to secure, but compartmentalization doesn’t actually make the system “hack-proof” as the article indicated, it just it makes it harder.
-
Great article, but this seems to good to be true. I don’t believe anything is hack proof, the hackers just haven’t found a way to find the vulnerabilities yet!!.
-
- Load More
Any type of zero day vulnerabilities are actually devastating for an organization.We can only hope the security holes are not out to public hackers to be exploited .Researchers did a great job in conveying the security gaps to samsung directly or the result would have been very acute.
Tizen was supposed to be an Android and iOS’s competitor started a few years ago. For some reason, the mobile OS did not catch on as Samsung hoped, so they decided to change the focus around Tizen. Long story short, they deployed Tizen to IoTs. I have not been paying much attention to Tizen, but I was always eager to learn about the quality of this Samsung’s operating system. A company in Samsung’s magnitude should and can do better to protect consumers. I understand Tizen has a lower profile than Android and iOS; however, it is not a good strategy to neglect Tizen’s security. Something people are using for stoves and ovens is quite serious matter.