Profile

Cover photo
Cyberia Technical Security Laboratory
564 followers|10,221 views
AboutPosts

Stream

 
"A new website published by chipmaker Intel asks readers "How Strong is Your Password?" and provides a form for estimating the strength of specific passcodes. It's too bad the question isn't "How Strong is your Password-grading site," because the answer, unfortunately, is "not very."

The most glaring problem with the site is its failure to use standard HTTPS Web encryption. Based on the secure sockets layer and transport layer security protocols, HTTPS ensures that a Website being accessed is authentic and operated by a legitimate entity, as opposed to a knock-off page created by someone who is able to control the end user's Internet connection."

+Intel +InfoSec Institute +Infosecurity Magazine +Infosecurity Europe +InfoSecurityFocus +IT SECURITY +Advanced Security | IT Security Training +IT Security Column +BalaBit IT Security +CISSP Training HQ  #informationtechnology   #itsecurity   #itsecuritynews   #hackers   #hacking   #cracking   #tech   #technology   #technews   #technologynews   #passwordsecurity   #passwordprotection  
1
Add a comment...
 
This "stupid criminal" story has IT security implications...

Could OAuth + social media save your devices if they get stolen? ;)

#facebook   #iphone   #iphone5   #itsec   #itsecurity   #itsecuritynews  
1
Cyberia Technical Security Laboratory's profile photoDalt Wisney's profile photo
7 comments
 
I only do legit stuff now, but I started off running an underground BBS and cracking warez. It seems like 100 years ago. The one thing I can say is that the music was better.
Add a comment...
 
NBC.com has been compromised with malware that exploits Java and PDF. If big corporations like NBC/General Electric came to US at Cyberia, this wouldn't have happened in the first place.

#itsecurity   #itsecuritynews   #itsec   #malware   #malwarealert   #malwarewarning   #nbc  +NBC +Network & IT Security +IT Security +Advanced Security | IT Security Training +IT SECURITY +InfoSec Institute 
1
Add a comment...
 
Phil Zimmerman of PGP develops new encyrption technology for phone calls and SMS... it's long overdue!

#philzimmerman   #pgp   #prettygoodprivacy   #gpg   #itsec   #itsecurity   #itsecuritynews   #mobile   #sms  
1
Add a comment...
 
"The terminal is a pretty powerful tool in Mac OS X. Hardcore server nuts can fly through preferences and settings tweaks without ever touching a GUI. Then there are some things you can do in the Terminal that are just straight out important. This is likely one of the latter, though it does present a bit of a privacy issue. According to OS X Daily the Launch Services quarantine keeps a list of every file you’ve ever downloaded on your Mac, as that’s what triggers the warning dialog about opening files from the Internet. Oddly enough, even if you’ve disabled this in the command line, the database is still keeping track.

To see this in action, simply paste this code into your terminal:

sqlite3 ~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV* 'select LSQuarantineDataURLString from LSQuarantineEvent'"

Here's yet another way #Apple  is monitoring you.

#macosx   #itsec   #itsecurity  
1
Add a comment...
Have them in circles
564 people
Jayne Gilvear's profile photo
dennis Joyce's profile photo
蘑小菇(蘑菇头)'s profile photo
SEO Content's profile photo
Sean Rooney's profile photo
Muhammad Shoaib's profile photo
sun xia's profile photo
Hal Board's profile photo
Frank Doyle's profile photo
 
"Not surprisingly, 95% of the state-affiliated attacks aimed at stealing intellectual property, which included classified information, trade secrets and technical resources, originated from China last year, according to the 2013 Data Breach Investigations Report. No organization, no matter how small, was safe."

#china   #chineseespionnage   #chinesehackers   #hacking   #cracking   #itsecurity   #itsec   #itsecuritynews  
1
Add a comment...
 
Wow, Beyonce, Jay-Z, Britney Spears, and Joe Biden among other celebs now have their sensitive financial data posted on a black-hat hacker's website.

I can see more than one way this could be done.

Targeted malware could have been sent to them, usually via a phishing/spoofed email.

The malware would be a keylogger rootkit with cookie capturing functionality, or possibly a RATS. Malware can easily be file-binded to a photo attachment in an email. Opening the photo would launch the malware, and the user would notice nothing wrong.

Then, the malware would send web browser cookies to the black-hat. Web browsers often have cookies for online banking!

Or... password retrieval questions could have been used. Everyone can easily look up Beyonce's birthplace, etc.

#beyonce   #jayz   #britneyspears   #joebiden   #hacking   #hackingnews   #itsec   #itsecurity   #itsecuritynews  
1
Add a comment...
 
This is how easy it is to hijack a Facebook or Twitter account, among others:

"Step one: Say you've forgotten your password.

Step two: Say you've forgotten your email address.

Step three: Use a security question or customer service rep to change over to a new email address—one you control.

Step four: Send a new password of your choosing to that new email address.

Step five: Log in."

#itsec   #itsecurity   #itsecuritynews   #facebook   #twitter   #socialmedia   #socialnetworking   #passwordsecurity  
1
Add a comment...
 
Here's a must read about an attack on Facebook...

#facebook   #socialmedia   #socialnetworking   #itsecurity   #itsecuritynews   #itsec  
Facebook said its computer system was "targeted in a sophisticated attack" last month, but that it found no evidence any user data was compromised.
1
Add a comment...
 
Another day, another IE vulnerability...

#microsoft   #internetexplorer   #internetexplorersucks   #internetexploder   #webbrowser   #itsec   #itsecurity   #itsecuritynews  
Summary: Unprivileged attackers can track your system-wide mouse movements from any IE page, even when the page is unfocused or minimised. Package: Microsoft Internet Explorer Affected: Tested on vers...
1
Add a comment...
 
Most people have Java on their PCs... Should you be worried about a recently discovered security vulnerability?

#java   #oracle   #itsecurity   #itsec   #itsecuritynews  
1
Add a comment...
People
Have them in circles
564 people
Jayne Gilvear's profile photo
dennis Joyce's profile photo
蘑小菇(蘑菇头)'s profile photo
SEO Content's profile photo
Sean Rooney's profile photo
Muhammad Shoaib's profile photo
sun xia's profile photo
Hal Board's profile photo
Frank Doyle's profile photo
Contact Information
Contact info
Phone
6477813695
Email
Story
Tagline
Need data recovery? Did your network go down? Were you hacked? Need digital forensics? We've worked with the RCMP and the Canadian Army. No job is too big or too small!
Introduction
We have over 25 years of experience with IT security, network set-up, security hardening, fixing and troubleshooting PC clients, servers, and neworking infrastructure and digital forensics. Past clients (as Coldstream) include the RCMP, the Canadian Military, Sears and Alcatel.
We offer the best rates in the business and no job is too big or small.
We'll do on-site work in the Toronto, Canada area and remote work anywhere in the world.