Author Archive

Well this is a Shell Shocking Bashing Mess!

If you are involved with cybersecurity in any fashion, then you know that yet another vulnerability has been discovered. However, this one could even be worse than The OpenSSL Heartbleed Vulnerability bug! Just a week ago a major security flaw was found...  [Read More]

Who’s Controlling your Vehicle?

As a blog follow up to the Black Hat 2014 Conference in Las Vegas, I had promised to cover the presentation where researchers Charlie Miller and Chris Valasek had named the most hackable cars in 2014. Charlie Miller and Chris Valasek have...  [Read More]

Interceptor, High Tech Hackers are in the Towers!

Well, there is someone intercepting your data while you drive along in your auto on the interstate. Who? Well, we don’t know that answer! Yes, it has been reported that there are so called rogue cell phone towers that are popping up...  [Read More]

Beware of Clicking that Destination on the Map!

Okay, everyone uses Google Maps. It is because we do not want to get lost trying to get to our destinations. However, what if there is a particular destination in which you would like to visit? Say, a place for dining out...  [Read More]

NCI’s Black Hat 2014 Wrap Up

On Tuesday, 5 August, the Black Hat 2014 training sessions were being wrapped up during the evening sessions. There were a number of topics that security experts were attending during the first couple of weeks of Black Hat 2014. I attended a...  [Read More]

World Cup Of Cyber Attacks

As the Brazil FIFA World Cup 2014 moved on to the finals, sponsors, patrons, banks, and organizations suffered significant damage by way of cyber-crime. Brazil’s banks, FIFA World Cup offices, and patrons were all targeted and fell victim to malicious bad actors in the...  [Read More]

The Facts of Attacks

This past May there were a significant decrease of cyber-attacks. As a network forensics engineer I have personally experienced this decrease in attacks. There were only small peak times of attacks that occurred in May which was middle and at the end...  [Read More]

Bank takes the fight to Criminal Hackers

The Bank of England will be going to cyber war with cyber criminals soon. Yes, The Bank of England has decided to use cyber threat intelligence methodologies for predicting and deterring cyber criminals from intruding and stealing credentials and money from their...  [Read More]

A Start At Securing Our Vital Assets

On February 12, 2014 the Obama Administration issued an Executive Order titled “Improving Critical infrastructure Cybersecurity”.  According to the order a cyber security framework will be developed that “…shall include a set of standards, methodologies, procedures, and processes that align policy, business,...  [Read More]