Posted by Josh on June 17, 2014 in
Security |
∞
I recently read an article in Defense Systems Magazine that toyed with the idea of using what most would consider obsolete technology as a “security” measure. In this case they were specifically talking about the use of 8-inch (yes, you read that right) floppy disks that hold about 1 to 1.2 megabytes of data. […]
Like this:
Like Loading...
Tags: hacking, Microsoft, obsolete, patch, privacy, security, unsupported
Posted by Josh on May 21, 2014 in
Security |
∞
Like this:
Like Loading...
Tags: passwords, security, social engineering
Posted by Josh on May 1, 2014 in
Security |
∞
On the 8th of April 2014, Microsoft effectively “pulled the plug” on its decade plus old operating system Windows XP. What this translates to for end users is fairly simple. Their Windows XP computer won’t stop running, but any future security issues that are identified with the Operating System will not be fix via a […]
Like this:
Like Loading...
Tags: ICS, Microsoft, SCADA, security, Stuxnet, Windows XP, WinXP, XP
Posted by Josh on November 20, 2012 in
Security |
∞
Online Privacy, to a large degree is a myth that we tell ourselves exists to ease our minds about the various things we do and place in to the ether of the beast called the Internet. The largest problem with the Internet and the concept of privacy is how the Internet works. As an […]
Like this:
Like Loading...
Tags: encryption, privacy, security, VPN, WiFi
Posted by Josh on November 8, 2012 in
Security |
∞
When people think of social media and security, they often focus on the security of the particular social media site they are using. Whether it is Facebook, Twitter, FourSquare, or any of the vast number of social media sites, the site itself is not your only concern. You might be your biggest security threat! You […]
Like this:
Like Loading...
Tags: clearance, Facebook, foursquare, security, social engineering, social media, twitter
Posted by Josh on October 1, 2012 in
AFCEA,
Security |
∞
Here is a great write-up of my August Continuing Education Lunch and Learn Program. AFCEA Signal Magazine
Like this:
Like Loading...
Tags: A+. Security+, AFCEA, Certifciation, CEU, CISSP, COMPTIA, Sec+, security, social engineering
Posted by Josh on August 26, 2012 in
Security |
∞
When you read about IT security, you see lots of hype about Operating System security, application security and various types of encryption. What is often left out is the concept of physical security. You might ask what physical security is and it is a good question! Physical security, as it applies to Information Technology, […]
Like this:
Like Loading...
Tags: badge, Biometrics, bump key, Clonezilla, hacking, id card, lock picking, magnetic swipe card, mantrap, RFID, security, social engineering
Posted by Josh on August 21, 2012 in
Security |
∞
This article by Dennis Fisher is a great piggy back on my Password Security and Social Engineering articles. For attackers looking to take control of a victim’s online presence, there is no better place to start than the target’s email account. If you own the email, you own the person. That’s never been more true than today, with […]
Like this:
Like Loading...
Tags: password, security, social engineering
Posted by Josh on August 13, 2012 in
Security |
∞
Within the US particularly and most “first world” countries, we live in societies of “always on” and “always connected” for both personal and our professional lives. While this 24×7 connection allows for greater productivity and hyper-connectivity, it is not without its own pitfalls. From both a personal and professional standpoint we must take a […]
Like this:
Like Loading...
Tags: Android, Apple, BlackBerry, BOYD, DaR, Data at Rest, encryption, iOS, iPad, iPhone, password cracker, security, smartphone, Truecrypt, VPN
Posted by Josh on August 5, 2012 in
Security |
∞
One of the most common threats to a computer user’s security is something that has been widely adopted by businesses and home users alike. Wireless internet connections, also known as Wi-Fi, has made connecting you computing devices to the internet easier in a wide range of locations. The same technology that allows you to connect […]
Like this:
Like Loading...
Tags: Firesheep, security, sidejacking, WiFi