Profile cover photo
Profile photo
Cyberia Technical Security Laboratory
Need data recovery? Did your network go down? Were you hacked? Need digital forensics? We've worked with the RCMP and the Canadian Army. No job is too big or too small!
Need data recovery? Did your network go down? Were you hacked? Need digital forensics? We've worked with the RCMP and the Canadian Army. No job is too big or too small!

Cyberia Technical Security Laboratory's posts

Post has attachment
"A new website published by chipmaker Intel asks readers "How Strong is Your Password?" and provides a form for estimating the strength of specific passcodes. It's too bad the question isn't "How Strong is your Password-grading site," because the answer, unfortunately, is "not very."

The most glaring problem with the site is its failure to use standard HTTPS Web encryption. Based on the secure sockets layer and transport layer security protocols, HTTPS ensures that a Website being accessed is authentic and operated by a legitimate entity, as opposed to a knock-off page created by someone who is able to control the end user's Internet connection."

+Intel +InfoSec Institute +Infosecurity Magazine +Infosecurity Europe +InfoSecurityFocus +IT SECURITY +Advanced Security | IT Security Training +IT Security Column +BalaBit IT Security +CISSP Training HQ  #informationtechnology   #itsecurity   #itsecuritynews   #hackers   #hacking   #cracking   #tech   #technology   #technews   #technologynews   #passwordsecurity   #passwordprotection  

Post has attachment
"Not surprisingly, 95% of the state-affiliated attacks aimed at stealing intellectual property, which included classified information, trade secrets and technical resources, originated from China last year, according to the 2013 Data Breach Investigations Report. No organization, no matter how small, was safe."

#china   #chineseespionnage   #chinesehackers   #hacking   #cracking   #itsecurity   #itsec   #itsecuritynews  

Post has attachment

Post has attachment
Wow, Beyonce, Jay-Z, Britney Spears, and Joe Biden among other celebs now have their sensitive financial data posted on a black-hat hacker's website.

I can see more than one way this could be done.

Targeted malware could have been sent to them, usually via a phishing/spoofed email.

The malware would be a keylogger rootkit with cookie capturing functionality, or possibly a RATS. Malware can easily be file-binded to a photo attachment in an email. Opening the photo would launch the malware, and the user would notice nothing wrong.

Then, the malware would send web browser cookies to the black-hat. Web browsers often have cookies for online banking!

Or... password retrieval questions could have been used. Everyone can easily look up Beyonce's birthplace, etc.

#beyonce   #jayz   #britneyspears   #joebiden   #hacking   #hackingnews   #itsec   #itsecurity   #itsecuritynews  

Post has attachment
This "stupid criminal" story has IT security implications...

Could OAuth + social media save your devices if they get stolen? ;)

#facebook   #iphone   #iphone5   #itsec   #itsecurity   #itsecuritynews  

Post has attachment
This is how easy it is to hijack a Facebook or Twitter account, among others:

"Step one: Say you've forgotten your password.

Step two: Say you've forgotten your email address.

Step three: Use a security question or customer service rep to change over to a new email address—one you control.

Step four: Send a new password of your choosing to that new email address.

Step five: Log in."

#itsec   #itsecurity   #itsecuritynews   #facebook   #twitter   #socialmedia   #socialnetworking   #passwordsecurity  

Post has attachment has been compromised with malware that exploits Java and PDF. If big corporations like NBC/General Electric came to US at Cyberia, this wouldn't have happened in the first place.

#itsecurity   #itsecuritynews   #itsec   #malware   #malwarealert   #malwarewarning   #nbc  +NBC +Network & IT Security +IT Security +Advanced Security | IT Security Training +IT SECURITY +InfoSec Institute 

Post has attachment

Post has attachment
Phil Zimmerman of PGP develops new encyrption technology for phone calls and SMS... it's long overdue!

#philzimmerman   #pgp   #prettygoodprivacy   #gpg   #itsec   #itsecurity   #itsecuritynews   #mobile   #sms  

Post has attachment
Wait while more posts are being loaded