- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,611,637 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
- CVE-2014-9862 (mac_os_x)
- CVE-2015-8946 (ecryptfs-utils, ubuntu_linux)
- CVE-2016-0635 (documaker, enterprise_manager_ops_center, health_sciences_information_manager, healthcare_master_person_index, insurance_calculation_engine, insurance_policy_administration_j2ee, insurance_rules_palette, primavera_contract_management, primavera_p6_enterprise_project_portfolio_management, retail_integration_bus, retail_order_broker_cloud_service)
Tag Archives: Hacking
Has your router been compromised? Is it secure? With F-Secure’s Router Check, you can check to see if your router provides a secure connection to the internet. Many routers today are older and some manufacturers have abandoned firmware updates. … Continue reading
This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal. Metasploit is designed to identify weaknesses in networks and hardware/software on a network. Do NOT use metasploit for … Continue reading
In order to understand security properly, you should also have an understanding of hacking. Understanding hacking gives users and IT professionals an understanding of how a breech occurs and tells how you can protect your network. A comprehensive guide can … Continue reading
HACKMAGEDDON is an excellent website where you can view breaches, security and other information.
The term MitM’d means man in the middle. Usually refers to a device or program that intercepts traffic between a source and a target.
I encourage my students to go over and visit Rick, Paul and Bill’s blog. In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections. Great Article. With our students going through some … Continue reading
So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs? You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading
ARSTechnica outlines how hackers have made malicious changes to routers….again. Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made … Continue reading
While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million. 800M exposed records make 2013 record … Continue reading
Check to see if your Adobe email was leaked during a recent breach. Change passwords on any account including on Adobe. Never use the same password for different websites. http://adobe.cynic.al/
Digital Attack Map is an excellent interactive attack map that allows for the viewing of DDoS attacks and more. This offers an animated view of DDoS attacks and has a gallery including news links on some of the largest attacks. Thanks Kevin … Continue reading
The Enhanced Mitigation Experience Toolkit which is also known as EMET is designed to assist IT Pros with securing their systems. EMET helps to block hackers from accessing systems. EMET helps to block common attacks and enables IT personnel … Continue reading
“Anonymous’ failed attack against Israeli websites last month has left security experts cautiously optimistic that the hacktivist group will be unsuccessful in its plans to disrupt U.S. government and banking sites. Anonymous plans to launch distributed denial of service (DDoS) … Continue reading
Secure your devices. Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices). Change the default passwords and update software/firmware when it is available. Disable UPNP and look for … Continue reading
Mickey found a great site that gives the approximate time it will take to break your password. The site, howsecureismypassword.net gives the approximate time and a background color that indicates how secure your password is. There are other things to … Continue reading
The website sicherheitstacho.edu shows cyber attacks as they happen. Currently with 97 sensors, the site gives information about malicious activities on the web.
2013 Predictions – Cyber Threats Steve As BYOD takes off in the workplace and in education, the use of social media along with emails on BYOD devices will cause infections and loss of data IDS/IPS systems along with firewalls that … Continue reading
China-backed hackers’ tactics are continuing and evolving, U.S. Defense Secretary Leon Panetta says, and are expanding and focusing more intently on critical American oil, gas and other energy companies. Chinese officials have steadfastly denied the cyberattacks, saying they also are … Continue reading