• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Week 08: Malware

Article 8: Google Maps Tests a Social Networking Feature

November 18, 2019 by Imran Jordan Kharabsheh Leave a Comment

Google has begun rolling out a pilot program that will allow Google Maps users visiting specific regions to “follow” that region’s top local guides who recommend, review and spread information on businesses and locations they visit. These “top local guides” are users of the community who actively and frequently review local businesses as a part of Google Maps’ new rewards program. The countries that this is rolled out for so far include London, Delhi, Mexico City, New York, San Francisco and Tokyo, with more to come if the trial proves succesful.

Source: https://tech.slashdot.org/story/19/11/18/2123252/google-maps-tests-a-social-networking-feature

Filed Under: Uncategorized, Week 08: Malware Tagged With:

Week 8 Presentation and Video

October 31, 2019 by Wade Mackey Leave a Comment

Intro-to-Ethical-Hacking-Week-8

 

https://capture.fox.temple.edu/Mediasite/Play/ab2489455d0a4295baf86b63361af17c1d

Filed Under: Week 08: Malware Tagged With:

Could your ERP system make you a victim of cybercrime?

October 30, 2019 by Penghui Ai Leave a Comment

Hackers can destroy a organization though multiple ways, and one of that is get the information on enterprise resource planning (ERP) software. The information including personal information, IP and financial data. All information, if in the wrong hands, could destroy a company. This article interprets that 90% of SAP systems are reported to be vulnerable to 10KBLAZE, a public exploit discovered in April this year. Even though the ORACLE publishes patches to fix the bugs, the company still needs make sure they have cybersecurity and application maintenance policies and procedures in place. They should also make sure that included in those procedures is an audit process that truly assesses the system – identifying any vulnerabilities, and ensuring fixes and patches are implemented in a timely manner.

 

https://www.natlawreview.com/article/could-your-erp-system-make-you-victim-cybercrime

Filed Under: Week 08: Malware Tagged With:

Senior Infosec Staffer Resigns, Says White House On Track To Be Hacked Again

October 26, 2019 by Percy Jacob Rwandarugali Leave a Comment

A senior member of the White House cybersecurity staff delivered his resignation as part of a scathing memo this week. Among other things, he claims security is taking a back seat to convenience at 1600 Pennsylvania Avenue.

That staffer was Dimitrios Vastakis, whose official title was branch chief of the White House computer network defense. His resignation this week is just the latest in a string of worrying departures by members of the White House infosec team.

Vastakis was originally part of the Office of the Chief Information Security Officer (OCISO). That Office was created just 5 years ago – after it was discovered that hackers linked to Russian intelligence agencies breached White House systems.

In a short amount of time, the staff of the OCISO made dramatic improvements to the White House systems known collectively as the Presidential Information Technology Community (PITC).

https://www.forbes.com/sites/leemathews/2019/10/23/senior-infosec-staffer-resigns-says-white-house-on-track-to-be-hacked-again/

Filed Under: Week 08: Malware Tagged With:

Cyware Weekly Threat Intelligence, October 14 – October 18, 2019

October 24, 2019 by Percy Jacob Rwandarugali Leave a Comment

This link gives weekly news about cyber security, this includes the good and bad stuff.

The Good
Another week has almost come to an end, and it was quite an eventful one in cyberspace. Let’s begin our weekly roundup with the positive cybersecurity advancements. The Medical Imaging & Technology Alliance (MITA) has released a cybersecurity playbook on medical device security and risk management processes. The Healthcare and Public Health Sector Coordinating Council (HSCC) has published guidance focusing on supply chain cybersecurity risk management. Meanwhile, Microsoft and NIST are working on a new guide to make enterprise patch management easier.

 

 

https://cyware.com/weekly-threat-briefing/cyware-weekly-threat-intelligence-october-14-october-18-2019-ddd4

Filed Under: Week 08: Malware Tagged With:

NordVPN confirms it was hacked

October 23, 2019 by Michael Kalai Leave a Comment

In March 2018 one of NoedVPN’s data centers in Finland was “accessed with no authorization,” said NordVPN spokesperson Laura Tyrell. The attacker gained access to the server, which had been active for about a month.  They exploited an insecure remote management system left by the data center provider; NordVPN said it was unaware that such a system existed.  This is such a breakdown of physical security and poor patch management. IT is also disturbing that they are reporting in October 2019 for an incident in march.

 

NordVPN confirms it was hacked

Filed Under: Week 08: Malware Tagged With:

Facebook Bounty Program

October 22, 2019 by Andrew P. Sardaro Leave a Comment

Facebook is looking to step up its application security through a bounty program aimed at identifying vulnerabilities in third-party apps. This move is in addition to their Data Abuse bounty program launched last year which rewarded testers who identified 3rd-party apps collecting data and passing it off to non-authorized parties.

Facebook security has taken a hit in the past year due to improper use of collected data and account hacking. Well, Mr. Zuckerberg looks to be making a public relations and financial effort to curtail the recent security issues by enticing third-party developers to design apps with security and set up a vulnerability disclosure programs. He will pay white-hat researchers to identify third-party apps with vulnerabilities, even if app developers don’t have a bounty program.

https://thehackernews.com/2019/10/facebook-apps-bug-bounty.html

Filed Under: Week 08: Malware Tagged With:

U.S. Government Still Uses Suspect Chinese Cameras

October 22, 2019 by Christopher James Lukens Leave a Comment

The United states banned the use of equipment from certain Chinese vendors but many of the cameras, around 2,700, are still in use. Its been difficult for government agencies to replace due to cost and technical challenges in some cases. This is great example of how tough vulnerability management and remediation can be when its at such a large scale. In some cases IT officials don’t think its a big deal and have been slow to remove cameras from their networks also showing how high level buy in is necessary in a process like remediation. In other cases they haven’t been replaced because they’re the cameras watching a bowling alley and not a nuclear facility so the risks are lower than the cost of replacing the cameras so nothing has been done about it.

https://www.wsj.com/articles/u-s-government-still-uses-suspect-chinese-cameras-11571486400

Filed Under: Week 08: Malware Tagged With:

Avast says hackers breached internal network through compromised VPN profile

October 21, 2019 by William Ha Leave a Comment

The breach occurred because the attacker compromised an employee’s VPN credentials, gaining access to an account that was not protected using a multi-factor authentication solution. The hacker successfully escalated privileges of the compromised credentials. I found it interesting that Avast allowed the hacker to roam free for weeks in order to track their whereabouts and figure out their intentions. They were able to gather that the intruder was extremely sophisticated and tried to cover their tracks to not be detected.

https://www.zdnet.com/article/avast-says-hackers-breached-internal-network-through-compromised-vpn-profile/

 

Filed Under: Week 08: Malware Tagged With:

SIM Cards in 29 Countries Vulnerable to Remote Simjacker Attacks

October 17, 2019 by Numneung Koedkietpong Leave a Comment

The article states about “SimJacker” vulnerability which attackers are able to remotely attack to mobile phone. This involves a SMS containing a specific type of spyware-like code being sent to a mobile phone to exploit the presence of a particular piece of software of S@T Browser on the SIM card. This weakness has spread over 29 countries including North America, South America, Africa, Europe, and Asia.  In addition, there is android application like SnoopSnitch to detect the attack according to suspicious binary SMS and  the SIMalliance has also improved some updates to  S@T browser specifications to increase the security of the SIM toolkits.

Source: https://thehackernews.com/2019/10/simjacker-vulnerability-exploit.html

Filed Under: Uncategorized, Week 08: Malware Tagged With:

  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in