Networking

Wasn't me.

We'll leave the person unnamed. But last night I wanted to stream the walking dead. LIVE of course. So I was doing some research. Wound up going to xfinity.comcast's site. And there were login credentials saved in my browser.

I've reformatted this computer and cleared my cache several times over.  STILL THERE.

Pay your comcast bill too. On time.

Tags: 

Pharming

Pharming is a type of cyber attack that aims to collect confidential user information by redirecting a website's traffic to a different, bogus website that appears identical to the original site. By hacking into DNS servers—the "phone books" of the internet—and changing IP addresses, high-tech criminals can automatically redirect users to their phony sites. In recent years, pharming has become a major concern for e-commerce and online banking sites. How does pharming differ from phishing?

Read More

Exabytes

An exabyte is a unit of information or computer storage equal to one quintillion bytes—an amount roughly represented by the number 1 followed by 18 zeros. Though the term is rarely encountered in any practical context, a popular, hotly contested assertion, which often cites as support a project at the UC Berkeley School of Information, is that "all words ever spoken by human beings" can be represented by approximately 5 exabytes of data. What is meant by the related term "exaflood"?

Read More

Tags: 

Physical Access

http://www.pcworld.com/article/3117793/security/a-usb-device-is-all-it-takes-to-steal-credentials-from-locked-pcs.html

Well if you're going to give a networking security specialist physical access to your computer. It doesn't take long to get in. Of course with the correct tools.

BUT STILL NONE THE LESS. ANOTHER AWESOME WAY, TO GET INSIDE.

Most users lock their computer screens when they temporarily step away from them. While this seems like a good security measure, it isn’t good enough, a researcher demonstrated this week.

Rob Fuller, principal security engineer at R5 Industries, found out that all it takes to copy an OS account password hash from a locked Windows computer is to plug in a special USB device for a few seconds. The hash can later be cracked or used directly in some network attacks.

For his attack, Fuller used a flash-drive-size computer called USB Armory that costs $155, but the same attack can be pulled off with cheaper devices, like the Hak5 LAN Turtle, which costs $50.

Read more at the above link.

Tags: 

Dells Acquisition COMPLETE

https://delltechnologies.com/en-us/press/dell-technologies-combination-announcement.htm

Dell Technologies becomes the world’s largest privately-controlled tech company
Unique corporate structure enables company the flexibility to innovate like a startup and invest in R&D for the long term while offering the trust, service and global scale of a large enterprise
Comprises unique family of businesses including Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream and VMware
Technology leader in 20 Gartner Magic Quadrants 
Blends Dell’s go-to-market strength with small business and mid-market customers and EMC’s strength with large enterprises 
New Dell Technologies and Dell EMC branding launched today
 

AUSTIN, Texas – September 7, 2016 – Dell Technologies today announced completion of the acquisition of EMC Corporation, creating a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset, information. This combination creates a $74 billion[1] market leader with an expansive technology portfolio that solves complex problems for customers in the industry’s fast-growing areas of hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. 

Read More on the above link...

Tags: 

Pages