• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Christie L Vazquez

News Article

December 5, 2017 by Christie L Vazquez Leave a Comment

NSA “Red Disk” Data Leak

Another NSA tool leaked. Although this one never made it to implementation and it was never fully deployed in the field. It was designed to be a intelligence sharing application.

Weekly News Article

November 13, 2017 by Christie L Vazquez Leave a Comment

https://www.darkreading.com/endpoint/new-banking-trojan-similar-to-dridex-zeus-gozi/d/d-id/1330407?

A newly discovered banking Trojan called IcedID looks monitors online activity. It sets up a local proxy and intercepts traffic, sounds like something we learned in class!

Weekly News Article

November 5, 2017 by Christie L Vazquez Leave a Comment

https://www.darkreading.com/analytics/security-monitoring/unstructured-data-the-threat-you-cannot-see–/a/d-id/1330070

A good area where AI, and machine learning will help the cyber industry. Information is critical to an IT organization especially during an incident. With unstructured data, data that is not in their SIEMs, it is a challenge for them to get ahead of threats.

Weekly News Article

October 31, 2017 by Christie L Vazquez Leave a Comment

https://www.darkreading.com/endpoint/phishing-kits-regularly-reused-by-cybercriminals/d/d-id/1330269?
Cyber criminals are getting a ROI, re-using phishing kits. Brings up the question, why aren’t monitoring tools picking these up before they are delivered to a user’s inbox.

Weekly News Article

October 21, 2017 by Christie L Vazquez Leave a Comment

A new IoT Botnet, compared to Mirai. Called “IoT_reaper” was first reported in September.

https://thehackernews.com/2017/10/iot-botnet-malware-attack.html

Week 7 – News Article

October 16, 2017 by Christie L Vazquez Leave a Comment

Interesting malware, DoubleLocker, can reset your PIN and encrypts your data. Interesting that is does both.

https://www.darkreading.com/mobile/doublelocker-delivers-unique-two-punch-hit-to-android–/d/d-id/1330134?

News Article -Week 6

October 8, 2017 by Christie L Vazquez Leave a Comment

https://thehackernews.com/2017/10/formbook-password-stealer.html

Malware as a service is becoming more popular, a keystroke capturing and password stealing program is available for purchase.

News Article – Week 5

October 2, 2017 by Christie L Vazquez 2 Comments

https://www.technewsworld.com/story/84801.html

Interesting article where Apache strikes back against the Equifax breach being caused by a vulnerability in their framework.

They note no one at the @equifax domain has been in contact with them, insinuating they haven’t managed their environment, and that Equifax didn’t use database encryption.

The article also goes into a good explanation of a zero day vulnerability.

News Article

September 24, 2017 by Christie L Vazquez 2 Comments

https://www.darkreading.com/partner-perspectives/f5/where-do-security-vulnerabilities-come-from/a/d-id/1329951?

I thought this article was timely, considering we are reviewing a company’s footprint. The author states security vulnerabilities come from three places, code quality, complexity and overly trusting data inputs.

I found it fascinating that “the current version of the Firefox browser, which contains 16 million lines of code written by 5,094 developers over ten years” and cannot imagine the complexity.

The author suggests reducing your exposure to only what you need, limit what you expose to the internet, perform risk assessments and test often.

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in