Do you know how secure your smart TV is? What about your phone? Is Siri constantly listening and recording waiting to hear “Hey Siri”? What is it doing with that information? What about your baby monitor? In 2018 NPR reported a South Carolina mother’s baby monitor had been hacked. She thought it was her husbandContinue reading “Creating a Consumer Secure Market Place”
Since before the depiction of Neptune immortalized in a mosaic in the 3rd Millenium, mosaics have been a source of wonder and amazement. The fine details in an artists expression has been part of past and current artistic works. Newer “artists” are creating masterpieces within a more digitized medium known as malware. This malware isContinue reading “MosaicLoader Malware”
In 1988 Wes Craven’s “Nightmare on Elm Street 4 – The Dream Master” was released. It was the same year Microsoft released Windows 2.1. I’m betting even Wes Craven couldn’t have imagined a scenario quite like PrintNightmare. Microsoft has tried to fix PrintNightmare 3 different times and they are going on their 4th. I’m goingContinue reading “PrintNightmare IV – The SYSTEM Master”
This article was presented at the University of Houston as a final term paper.
Security Analysts are plagued with hackers potentially compromising their network and infrastructure. This is the main reason that IDS and IPS were created, to help assist with the hunt for intruders. Like the names say IDS is Intrusion Detection System, and IPS is Intrusion Prevention System, I will be going into more detail on whatContinue reading “Why you need an IDS or an IPS”
This is a blog website that was started by University of Houston Cybersecurity students/professionals. This was started on a whim and will be upheld a group od cybersecurity students turned professional. This website will be focused on Cybersecurity tips, lessons learned, news, ideas, and information. The articles will be posted by Cybersecurity students, professionals, andContinue reading “Introduce Yourself”