Tag Archives: apple security

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Rate this:

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Understand hacking to understand security

In order to understand security properly, you should also have an understanding of hacking.  Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network.  A comprehensive guide can … Continue reading

Rate this:

Posted in Computer Security, Computers, Hacking, Information Technology, Technology | Tagged , , , , , , , | Leave a comment

Cyber Threat Maps

Here’s a few cyber threat maps showing attacks live. FireEye https://www.fireeye.com/cyber-map/threat-map.html Kaspersky https://cybermap.kaspersky.com/ Norse http://map.ipviking.com/ Arbor Networks DDoS Attacks http://www.digitalattackmap.com/#anim=1&color=0&country=ALL&list=0&time=16446&view=map Honeynet.org Anubisnetworks http://globe.cyberfeed.net/ Security Wizardry http://www.securitywizardry.com/radar.htm Alien Vault https://www.alienvault.com/open-threat-exchange/dashboard#/threats/top FSecure http://worldmap3.f-secure.com/ TrendMicro http://www.trendmicro.com/us/security-intelligence/current-threat-activity/global-botnet-map/index.html Global Spam (Trend) http://www.sicherheitstacho.eu/ Akamai http://www.akamai.com/html/technology/dataviz1.html Global … Continue reading

Rate this:

Posted in Computer Security, Hacking, Information Technology, internet security; | Tagged , , , , , , , , | 2 Comments

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

October is National Cyber Security Awareness Month

National Cyber Security Awareness Month (NCSAM) – celebrated every October – was created as a collaborative effort between government and industry to ensure every American has the resources they need to stay safer and more secure online. Free Security Check … Continue reading

Rate this:

Posted in Apple, Business, Computer Security, Computers, Education, Information Technology, Linux, Medical, network, Networking, Technology, Ubuntu, Windows | Tagged , , , , , , , , , | 1 Comment

Details about the Mac Malware attacks in 2012

We were interviewed about  Mac Malware with PCWorld and now the details about the attack from Naked Security. (April 13, 2012) “Flashback Malware Puts Apple in Security Spotlight: Experts Weigh In” – PCWorld

Rate this:

Posted in Apple, Computer Security, Computers, Education, Information Technology, Windows | Tagged , , , , | Leave a comment

Apple Takes Tool offline After New Security Hole Surfaces

“Less than a day after Apple announced a new two-factor authentication to better protect Apple ID and iCloud accounts, the company was scrambling to fix another major security hole with its own password reset tool.” AddThis ThreatPost Apple Takes Tool … Continue reading

Rate this:

Posted in Apple | Tagged , , | Leave a comment

Apple ID Leak Traced to Florida Publishing Company | CIO Today

BlueToad, a digital publishing company in Orlando, says a stolen list of Apple device names and UDIDs came from its computers, not the FBI’s, as hacker group AntiSec had claimed. AntiSec is linked to a group known as Anonymous, which … Continue reading

Rate this:

Posted in Computers | Tagged , , , , | Leave a comment

Testing your IPv6 security

With IPv6, your computer may be exposed to the internet.  Here’s a link that test your connection with NMap.  Make sure your organization knows you are testing your computer’s security. NMap finds open ports and weaknesses in your security.  Note … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , , , , | Leave a comment

Cyber Terrorism – Al Qaeda Video Calls for Electronic Jihad

The National Terror Alert Response Center has an excellent article Al Qaeda may be turning its destructive attention to cyber-warfare against the United States. In a chilling video, an al Qaeda operative calls for “electronic jihad” against the United States, and … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , , , , | Leave a comment

Windows More Secure Than OS X

But in fairness to Apple, they have improved leaps and bounds in their security compared to their older operating systems. Their latest operating system OS X Lion makes up a lot of lost ground and has greatly improved security. Yet they still have further … Continue reading

Rate this:

Posted in Computers | Tagged , , , , , | 1 Comment

Apple Fixes 81 Security Holes in iOS 5.1 including Siri and Passcode Flaws

Cupertino, California-based Apple released fixes for a bevy of security flaws in its iOS mobile operating system, including security flaws affecting the Siri personal assistant, the iOS passcode feature, and more than five dozen flaws in the WebKit Web rendering enging … Continue reading

Rate this:

Posted in Computer Security, Computers, Information Technology | Tagged , , , , | Leave a comment

Apple’s Lion OS At Risk To Password Vulnerability

A flaw in Apple OS X 10.7, aka Lion, would enable an attacker to change a user’s system password without having to know the previous password. As a result, an attacker–albeit with physical access to the machine–would be able to … Continue reading

Rate this:

Posted in Computers | Tagged , , , | Leave a comment

OS X Lion accepts any LDAP password

OS X Lion accepts any LDAP password, creates enterprise network nightmare- LDAP servers often contain sensitive enterprise data, so a successful attack on one of the servers is a bonanza to hackers. For some reason, Macs running Lion that use … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Hacking, Information Technology, network, Networking, Technology | Tagged , , , , , | Leave a comment

Help Net Security – Free [IN] Secure Magazine

Help Net Security has one of the best magazines available for anyone wanting to learn about the latest trends, information, tutorials and other info on technology security.  Help Net Security has over 30 sponsors that help with their [IN]Secure Magazine … Continue reading

Rate this:

Posted in Business, Computer Security, Computers, Education, freeware, Hacking, Health, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , , , , , | Leave a comment

Apple the new world leader in software insecurity

The world\’s largest technology company has earned another accolade: it was responsible for the largest number of security flaws in the first half of 2010, knocking Oracle off the top spot. Microsoft is in third place. via Apple the new … Continue reading

Rate this:

Posted in Computer Security, Computers, Education, Hacking, Information Technology, network, Technology | Tagged , , , , , | Leave a comment

Apple Patches Serious Bug in Software Update

Apple Patches Serious Bug in Software Update. It doesn’t matter what OS you have, you have to get updates to prevent being compromised.

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment

Geolocation, mobile devices and Apple top the list of emerging threats

Geolocation, mobile devices and Apple top the list of emerging threats. AddThis

Rate this:

Posted in Computers | Tagged , , , , , | Leave a comment