Creating a Consumer Secure Market Place

Do you know how secure your smart TV is? What about your phone? Is Siri constantly listening and recording waiting to hear “Hey Siri”? What is it doing with that information? What about your baby monitor? In 2018 NPR reported a South Carolina mother’s baby monitor had been hacked. She thought it was her husbandContinue reading “Creating a Consumer Secure Market Place”

MosaicLoader Malware

Since before the depiction of Neptune immortalized in a mosaic in the 3rd Millenium, mosaics have been a source of wonder and amazement. The fine details in an artists expression has been part of past and current artistic works. Newer “artists” are creating masterpieces within a more digitized medium known as malware. This malware isContinue reading “MosaicLoader Malware”

PrintNightmare IV – The SYSTEM Master

In 1988 Wes Craven’s “Nightmare on Elm Street 4 – The Dream Master” was released. It was the same year Microsoft released Windows 2.1. I’m betting even Wes Craven couldn’t have imagined a scenario quite like PrintNightmare. Microsoft has tried to fix PrintNightmare 3 different times and they are going on their 4th. I’m goingContinue reading “PrintNightmare IV – The SYSTEM Master”

Kaseya With a Helping of PrintNightmare

I have been deep in to researching (AKA: Twitter-ing) the Kaseya Attack and the PrintNightmare vulnerability. I’m going to keep it somewhat short. First, lets look at the technical perspective and how organizations are dealing with PrintNightmare and Kaseya attack. I will then focus on why it’s important to keep an eye out for theseContinue reading “Kaseya With a Helping of PrintNightmare”

The Cyber Dudes on Encryption

One of the best things you could do for yourself is encrypt your drive. I highly recommend it. I will take this opportunity to show you how. The benefits to encryption is data security. Encrypting your drive will create security keys on all your files that cannot be removed without the encryption key. What isContinue reading “The Cyber Dudes on Encryption”