Blog Posts Tagged with "Dan Dieterle"
March 22, 2012 Added by:Dan Dieterle
Hackers are getting much better at their craft, and people are making it very easy for them. A Social Engineer will use information gathered about a person, place or business in specially crafted attacks that play on people’s thoughts, beliefs or emotions...
March 06, 2012 Added by:Dan Dieterle
North Korean Students that show aptitude are selected from elementary schools and are groomed in cyber warfare throughout their college years. They constantly hone their skills and even attend foreign colleges to learn the latest security techniques...
March 01, 2012 Added by:Dan Dieterle
The thing is that the lower security hashes are not present on the SAM stored on the hard drive. When the security accounts are loaded into active RAM, Windows re-creates the LM hashes. The LM Hash can be pulled from active RAM using the Windows Credential Editor (WCE)...
February 21, 2012 Added by:Dan Dieterle
Nation State hackers are active in attacking and compromising military, government and defense contractor sites. Terrorists are using social media sites to recruit, train and spread their poison. In essence we are in a Cyber Cold War. We need a Cyber Special Forces group...
February 13, 2012 Added by:Dan Dieterle
A congressional official has confirmed that Iran did not bring down the drone with it’s “cyber warfare” skills. Information from a 10 week CIA review seems to point to a malfunctioning data stream. Information from the faulty stream may have led the drone operator to land the UAV...
February 09, 2012 Added by:Dan Dieterle
Looking for a program that monitors internet use, allows granular control over sites and services they can access, coupled with comprehensive web security and threat detection that includes scanning with three Anti-Virus engines? Look no further...
February 01, 2012 Added by:Dan Dieterle
A vulnerability scanner is a tool that can automatically scan your network and the systems connected to it, examining each one for vulnerabilities that could be exploited. Malicious users frequently use scanners to hunt for ways to compromise your systems...
January 20, 2012 Added by:Dan Dieterle
Metasploit is used for network security and penetration testing. There are automated options that you can use that will try numerous exploits against a system, and give you a remote shell if one works. Taking this technology and adding PLC exploits is truly scary...
January 19, 2012 Added by:Dan Dieterle
Growing up I heard numerous times that the Soviet's needed so many missiles to protect it’s vast land mass from aggressors. Everyone knew that the large missile stockpile was more of a threat than a safety net. It seems that China may be trying to play the same card...
January 15, 2012 Added by:Dan Dieterle
Ubuntu has received some stiff competition from Linux Mint. Distrowatch shows that Linux Mint has been the most popular Linux distribution over the last year, and it comes with the firewall graphical user interface installed...
Indicators of Compromise for Malware Used by... Jeanson Ancheta on 12-22-2014
Paying Lip Service (Mostly) to User Educatio... Sherrley Max on 12-20-2014
Update 3: Hackers May Leak Norton Antivirus ... Prabhas Raju on 12-19-2014