• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Penghui Ai

IT Firm Manager Arrested in the Biggest Data Breach Case of Ecuador’s History

September 23, 2019 by Penghui Ai 1 Comment

Ecuador authorities have captured its senior manager of IT counseling firm Novaestrat after the individual subtleties of nearly the whole population left uncovered online in what is the biggest data breach in the nation’s history.
The source of this breach is Novaestrat’s unsecured Elasticsearch server based in Miami. It contained 18GB reserve of information of government vaults, an automotive association, and an Ecuadorian national bank.
As a component of the investigation, Ecuadorian authorities said they had captured the administrator of Novaestrat William Roberto G, and held onto electronic hardware, PCs, stockpiling gadgets, and documentation during an attack at his home.
Given the security concerns encompassing the occurrence, the nation’s Minister of Telecommunications said legitimate actions would be made against the influenced foundations to endorse privately owned businesses in charge of damaging protection and publicizing individual data without approval.
The Minister of Telecommunications additionally said it is intending to pass another information security law in the nation, which they have been working for as far back as eight months, to ensure the individual information of its residents.

https://thehackernews.com/2019/09/ecuador-data-breach.html

Filed Under: Week 05: Metasploit Tagged With:

The Windows 10 security guide: How to safeguard your business

September 14, 2019 by Penghui Ai Leave a Comment

This article interprets some approaches to make your Windows 10 more secure. For a big company, they should have an IT security specialist to manage their system. For a small company, it is better to outsource the responsibilities to the third party. Also, it provides some suggestions for all businesses.
MANAGING UPDATES
The absolute most significant security setting for any Windows 10 PC is guaranteeing that updates are being introduced on a normal, unsurprising timetable. That is valid for each advanced processing gadget, obviously, yet the “Windows as an administration” model that Microsoft presented with Windows 10 changes how you oversee refreshes.
IDENTITY AND USER ACCOUNT MANAGEMENT
Each window 10 PC requires at any rate one user account, which is thus ensured by a secret password and optional validation components. How you set up that account goes far toward guaranteeing the security of the device. Physical security is significant as issues identified with software or networks. For a business or a government agency, the effect can be shocking, and the results are surprisingly more terrible in controlled enterprises or where information break laws require open revelation. On a Windows 10 device, the absolute most significant setup changes you can make is to enable BitLocker device encryption.
BLOCKING MALICIOUS CODE
As the world has turned out to be increasingly associated and online aggressors have turned out to be progressively complex, the job of conventional antivirus software has changed. Rather than being the essential device for hindering the establishment of malicious code, security software is currently simply one more layer in a guarded methodology. Each establishment of Windows 10 incorporates built-in antivirus, anti-malware software called Windows Defender, which updates itself utilizing a similar instrument as Windows Update. Windows Defender is intended to be a set-it-and-forget-it feature and doesn’t require any manual design. If you install an outside security bundle, Windows Defender moves to one side and enables that product to distinguish and evacuate potential dangers. Large organizations that utilization Windows Enterprise edition can send Windows Defender Advanced Threat Protection, a security platform that monitors endpoints, for example, Windows 10 PCs using behavioral sensors. Using cloud-based investigation, Windows Defender ATP can identify suspicious behavior and alert administrators to potential dangers.
NETWORKING
Each version of Windows in the previous 15 years has incorporated a stateful investigation firewall. In Windows 10, this firewall is empowered by default and need not bother with any tweaking to be effective. Similarly, as with its predecessors, the Windows 10 firewall supports three distinctive network configurations: Domain, Private, and Public. Applications that need access to arrange assets can by and large design themselves as a part of starting arrangement.
To modify fundamental Windows firewall settings, utilize the Firewall and Network Protection tab in the Windows Security application. For an increasingly exhaustive, expert-only arrangement of setup tools, click Advanced Settings to open the legacy Windows Defender Firewall with Advanced Security console. On managed networks, these settings can be controlled through a combination of Group Policy and server-side settings.

https://www.zdnet.com/article/the-windows-10-security-guide-how-to-safeguard-your-business/

Filed Under: Week 04: Network Mapping and Vulnerability Scanning Tagged With:

Foxit PDF Software Company Suffers Data Breach—Asks Users to Reset Password

September 11, 2019 by Penghui Ai Leave a Comment

The reason why I post this article is that I am a Foxit PDF software user with an account. From the article, we know that  unknown third-parties gained unauthorized access to Foxit’s data systems recently and accessed its registered users’ data, including user’s email addresses, passwords, users’ names, phone numbers, company names, and IP addresses. I use my Wechat account to access the Foxit, so I take this event very serious. However, I found that the Foxit annouce that users in China will not affect by this data breach because Chinese users do not use the same register path with users from other country. It is interesting that Foxit did not send any email or any kind of message to its Chinese users, at least I did not receive any. In addition, I do not know whether Chinese users is really safe in this event, so if you have any professional opinion about this event, welcome to share it on comments.

 

https://thehackernews.com/2019/08/foxit-pdf-reader-data-breach.html

Filed Under: Week 03: Reconnaisance Tagged With:

  • « Go to Previous Page
  • Page 1
  • Page 2

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in