
Prepare for Ransomware
Recently technical guidance was released for CIOs and CISOs on how to prepare for a ransomware attack. This guide was a joint effort of multiple Federal agencies to address the growing concern of ransomware. In, “How to protect your Networks from Ransomware,” they provide some suggestions for prevention and response. We have created a checklist below to help you based on their recommendations. You can review your current polices, procedures and plans to see if you are cover

FruitFly Malware
A Justice Department indictment alleges a 28-year-old hacker from Ohio, created the FruitFly malware and spied on Apple computers for 13 Years. Phillip R. Durachinsky is a good example of why we have all the security protections in place and why it is important for everyone to take part in securing their systems. According to the Department of Justice indictment, Durachinsky spied on thousands of people, plucking millions of photos and other sensitive data from their computer

AI in Hacking
Eric Ilmberger CNT 52 Network+ I went looking for news on mass AI attacks but was unable to really find anything. As AI develops further and further, the security implementations of it will no doubt come into play. While there does not seem to be any major incidents related to AI on the side of hackers, there has been use to increase the way known attacks are carried out. “The AI, named SNAP_R, sent simulated spear-phishing tweets to over 800 users at a rate of 6.75 tweets pe

12 DEC 2017 Security Update
In this issue will will cover recent news topics in cyber security. #Security #Antimalware #Malware #Hacker #Hacking #Cybercrime #Cybersecurity #CyberSafety #Cyberwarfare

Student Notes November 2017
Don, Since we'd been talking about AI recently in the beginning of class before we get down to the lesson of the day, thought you'd might find this interesting. http://www.iflscience.com/technology/ai-programmed-to-solve-zodiac-killer-mystery-creates-creepy-poetry-on-the-side/ Happy Thanksgivings, Jeffrey Graham Don, Something to show your CNT 51 class about help desk. Medieval helpdesk with English subtitles Tim, Mr. Hester, Ransomware spreading through RDP https://nakedsecu

Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial to include international waters. For physical security, many of them host information in old nuclear bunkers. Bulletproof hosting service will leave you sites even if requested for legitimate reasons. These hosts are haven for criminal, nation-states and dirty corporate secrets. Some hosts are nomads and move if the police try to force the

The Wolf
Stop what you are doing and watch this. It's a big ad for HP but you gotta take a minute to view it. Especially after what we were talking about last night about what to cover in your blog. Chris Knight Christian Slater stars as The Wolf in a cautionary tale about what happens when print security goes overlooked. From director Lance Acord. http://www.hp.com/TheWolf The Wolf ft. Christian Slater | HP If you're not taking your printer security seriously, someone else might be

Hackers Steal Celebrity Plastic Surgery Photos
Hackers Steal Celebrity Plastic Surgery Photos, Demand Ransom (The Young Turks) Hackers are demanding big money to not release plastic surgery photos of celebrities and royalty. Cenk Uygur and Ana Kasparian, hosts of The Young Turks, discuss. Tell us what you think in the comment section below. Reference The Daily Beast “Hackers Steal Photos From Plastic Surgeon to the Stars, Claim Trove Includes Royals. The Dark Overlord, a hacking group known for mocking and extorting vict

Bad Rabbit Ransomeware: Get Your Holy Hand Grenade!
On October 24th, ransomware known as Bad Rabbit infected devices primarily in Russia and Ukraine. According to Kaspersky Lab, almost 200 targets have been hit. Those infected include the Russian media outlet Interfax, the Kiev metro system and the Odessa airport. One of the ways the attack spread was through a fake Adobe Flash Player update. Bad Rabbit is similar to Petya that spread earlier this year which encrypts files and demands a ransom to get them back. At the moment,

New Attack Techniques 2017
The Seven Most Dangerous New Attack Techniques, and What's Coming Next "Moderator: Alan Paller, Research Director and Founder, SANS Institute. Which are the most dangerous new attack techniques? How do they work? How can you stop them? What’s coming next and how can you prepare? This fast-paced briefing provides answers from the three people best positioned to know the answers: the head of the Internet Storm Center, the top hacker exploits expert/teacher in the US and the top