Phishing Attacks & Defense

,
Phishing is one of the most common (and effective) forms of cyber attacks today. In this short video, we’ll examine some simple techniques that can be used (by technical and non-technical individuals) to better defend against phishing attacks. For an in-depth exploration of phishing attacks and how you can defend against them enroll in the…
Read More

Why Do We Even Have That Server?!

Wow! What an end to a good (albeit frustrating) week! In between multiple engagements for several clients this week, I somehow managed to learn that “flowers are like a picnic for butterflies…” Yep, busy week but I still managed to get in all the bedtime stories with the kids! I’ve seen an interesting trend during…
Read More

Seat Belts Save Lives…We Should Stop Using Them

,
Sounds a bit crazy doesn’t it? Seat belts have been proven to significantly reduce the risk of death or serious injury in the event of a motor vehicle crash, and I’m recommending that we stop using them altogether? Why in the world would someone in their right mind make that kind of recommendation!? It’s simple,…
Read More

Quick Connection Info with ‘netstat’ (Linux)

There are things in this world that will likely always be a mystery to me. For example, why are feminine hygiene products and toothpaste both stored in similar looking tubes? As both of these products are often found in bathrooms around the world it stands to reason that some poor guy (likely living in a…
Read More

Simple ICMP Host Discovery with Nmap

The other day I needed to rapidly scan a range of IP addresses for hosts that responded to ICMP echo requests. I also needed the responding IP addresses to be in a simple list format (with a single IP per line). While there are many ways to do this I needed something quick (only had…
Read More

Sun Who? – Foundational Principles for a Stronger Cybersecurity Posture

I recently attended a security symposium sponsored by some great agencies and organizations. One of the speakers really got me thinking about the foundational principles for a strong cybersecurity posture which inspired me to do some additional research and present my conclusions. My hope is that someone else might find these concepts useful in strengthening their…
Read More

MIT(R)M Attacks – Your middle or mine?

Recently (actually months ago now) my wife went out to see some friends from Church which left me with a couple of hours to kill at home (after I put the kids bed of course). I decided to use this opportunity to look for security vulnerabilities in the wireless router provided by my ISP. I…
Read More
Menu