CEH was too easy

Certified Ethical Hacker exam was just too easy. I took it in December and passed with only 2 days of prep. I used Boson exam simulations which pretty much covered everything that was on the exam 125 multiple choice questions varied on topics such as Nmap switches, VLAN types, TCP/…

Ransomware and Healthcare Organizations

The Office for Civil Rights OCR seems to consider all ransomware events a breach unless proven otherwise. This is because successful ransomware incidents affect all three aspects of data security (Confidentiality, Integrity, and Availability). Specifically: Confidentiality: Ransomware gained access to your data and encrypted it. This unuathorized access violated the…

Lessons from BSides ATL and ISSA GA

BSides Atlanta: Ransomware is adapting to evade countermeasures Train your users to identify phishing emails Manually test your backups at least monthly or depending on how many days worth of data you are willing to lose How do I recover from a ransomware outbreak? Remain calm Isolate the machine from…

A Healthy Dose of Ransomware

Healthcare continue to be a prime target for ransomware. All hospitals, small and large, seem to be on a hit list. Hospitals around the U.S. are reporting ransomware incidents. In fact, HHS has stepped in with its guidelines on ransomware and claims a ransomware incident is a data breach…

Stop Using MS Word/Excel "Restrict Editing" Option

Clarification: These methods only work for documents that are "restricted for editing". It does not work for files that are "password encrypted". Microsoft Word stores passwords hashes and salts inside the document. Method 1: Rename filename.docx file extension to filename.zip Open resulting zip file…

Let's Talk Crypto

Cryptography is big part of today's information security. Hence, it is important to know at least the basics. So, let's begin with some terms and their definitions. Cryptography: The art and science of making secret codes. Cryptanalysis: Analysis of secret codes. In other words, art and science of breaking codes.…

Investigating a DNS DDoS Attack

Update: AT&T sent me a new modem which gave me a new IP address. All is fine now :) ORIGINAL POST: Last night I began noticing extreme slowness in traffic bound to Google Play Store. Strangely enough, all other network traffic was fine. Upon further investigation, I realized that…

Big day for exploits

Nearly 90 percent of Android devices vulnerable to endless reboot bug.- Exploits a flaw in Android media players when running .mkv files only. The vulnerability affects Android versions 4.0.1 to 5.1.1 Google has already patched the vulnerability. http://www.scmagazine.com/yet-another-dos-vulnerability-affects-android-devices/article/430661/ Revamped…