Phishing is a powerful and effective tool and a favorite in the threat actor arsenal. So what happens when your cloud provider gives threat actors a roadmap to steal from you? A couple of weeks ago, Workday sent a security advisory to its customers regarding a phishing campaign targeting its customers. Although details of the… Continue reading Your cloud provider is making you a target
American politics is an extremely divisive issue and I will not be taking any sides in this debate. The purpose of this article isn’t to promote any sides but rather to talk about how encrypted communication tools are being used. Michael Moore launched a sub-page to his domain called Trumpileaks. The purpose is to give… Continue reading Michael Moore launches Trumpileaks using strong encryption tools
2017 is shaping up to be a busy year for Information Security professionals. The last major hack was HipChat from Atlassian. Surprisingly most consumers still “don’t care” about their data security and millions have bad security hygiene. Visualizing the hacks To make the data more palatable, firms have tried to create visually appealing representation of… Continue reading 2017 has started as a busy year for hackers
1 – Random.org Random.org has been one of my favorite sites for a long time. It uses atmospheric noise to generate its randomness which is much better than the logical pseudo-random generators used by many sites and service. You choose the password parameters you need and it generates wonderfully random passwords to use with your… Continue reading 5 best Random Password Generators
There is no such thing as bulletproof security. If a well funded, technically competent and determined adversary is targeting you, they will get in. Your job is to make their life as difficult as possible by using passwords that are complex (difficult to guess) and by keeping your software up to date. Apple has been… Continue reading You should download the latest IOS upgrade now
November 25 2016 update at the end of the article. TL;DR the service is still vulnerable. Since I traveled a lot in the past, I am always looking for new tech to make travel simpler,. easier or more enjoyable. Since smartphones are indispensable travel tools, I was very excited when SkyRoam was released and wrote… Continue reading The hidden danger of using the SkyRoam global WIFI Hotspot
When a new undisclosed (0 day) vulnerability is used to hack a target’s device, the media jumps all over it and create a small panic. Government intelligence and organized crime are always looking for new creative ways to break into target devices and are willing to pay top dollar for new unknown hacks. Vulnerability brokers… Continue reading Will your Android phone allow someone to hack you?