Archive for the ‘Infosec’ Category:

On Capture the Flag

Do you have l33t skills on targeted attacks, Internet of Things (IoT) and Industrial Control Systems (ICS/SCADA) and cybercrime? Interested in having some extra cash (JPY 1,000,000 (approximately US $8,700) or want to have have some fun while learning and building more knowledge in the InfoSec industry?  If yes, then read on… Trend Micro is

(Read More…)

Tags: ,

On SHA1

I posted google’s announcement on the SHA1 Shattering in twitter several weeks ago Bye #SHA1 https://t.co/W3X5RMQhGO https://t.co/BZ4qvT1TZG pic.twitter.com/PlDFrTCCzY — Menard Osena (@Menardconnect) February 24, 2017 And I was surprised that a fellow infosec dude replied and tweeted @Menardconnect a security platform still used MD5. shhhh… — daves espia (@daves_espia) February 24, 2017 and it seems

(Read More…)

Tags:

On Ransomware

“They can beg and they can plead But they can’t see the light Coz the boy with the cold hard cash Is always Mr. Right” Material Girl, Madonna I was planning to write about Ransomware for a long long time but I don’t know where to start. Will I start with the email that my

(Read More…)

Tags:

On Pump and Dump Spam Run

I thought they were an extinct in the wild technological mal-species already. But just yesterday I got this spammy mail via my mailbox: Image 1. Suspicious Email Sorry I choose not comment on the company as I do not have verifiable info on them nr their industry. But I did not subscribe the affected mailbox

(Read More…)

Tags:

On Potentially Unwanted

I have been busy the past few months because of these PUAs (Potentially Unwanted Apps). Honestly I consider myself lucky because yours truly was an old-school AV veteran that survived the good ol’ spyware wars (circa 2003) so connecting the dots for this technical challenge will be considerably an easy task. As I have not

(Read More…)

Tags: ,

On Vulnerability Scanning – Part 2

Thus do many calculations lead to victory, and few calculations to defeat: how much more no calculation at all! It is by attention to this point that I can foresee who is likely to win or lose. Sun Tzu, Art of War This is the 2nd part of my Vulnerability scanning post. Background: A friend

(Read More…)

On Vulnerability Scanning

“The general who wins the battle makes many calculations in his temple before the battle is fought. The general who loses makes but few calculations beforehand” Sun Tzu, Art of War A friend of mine asked me if I can give my advice about vulnerability scanning. He is enrolled in an information security class in

(Read More…)

© AVSecurityProductManager.com
CyberChimps