dustindecker.org
Internet Status | 1 On 1 Security
http://www.dustindecker.org/internet_status
About 1 On 1. Raquo; Hot News. Raquo; Internet Status. On Mon, 11/17/2014 - 18:18. What's happening on the Internet "right now"? Here's a spartan list of resources you might find useful. This page is largely static and infrequently updated. Http:/ www.digitalattackmap.com/. Http:/ www.securitywizardry.com/radar.htm.
dustindecker.net
Anonymity | 1 On 1 Security
http://www.dustindecker.net/taxonomy/term/16
About 1 On 1. Human rights organizations launch free tool to detect surveillance software. It scans a person's computer for traces of surveillance software, or spyware. Anonymous 101: The Basics of Computer Security. So you want to be Anonymous?
dustindecker.net
Intrusion Detection | 1 On 1 Security
http://www.dustindecker.net/IDS
About 1 On 1. Raquo; Our Services. Raquo; Intrusion Detection. On Thu, 10/16/2014 - 20:36. 1 On 1 Security offers custom Intrusion Detection services, with a 24x7 monitoring live monitoring and response component to ensure your sensitive information remains protected, like a security guard at the edge of your network.
dustindecker.org
mFi Building Automation | 1 On 1 Security
http://www.dustindecker.org/unifi
About 1 On 1. Raquo; Our Services. Raquo; mFi Building Automation. On Wed, 11/26/2014 - 10:54. Ubiquiti offers a wide selection of sensors including motion, temperature, current and door/window sensors. Connect sensors to the mPort to create an intelligent mFi. Network for machine management and smart building automation. Make buildings smarter and more efficient using the intuitive UI and powerful features of the mFi. Outlet and Switch/Dimmer readily connect to any Wi-Fi network.
dustindecker.org
Mobile Security | 1 On 1 Security
http://www.dustindecker.org/taxonomy/term/43
About 1 On 1. Raquo; Mobile Security. Complex Android malware believed to have infected up to 4.5M smartphones in the U.S. As many as 4.5 million American Android. Smartphone users may have been fooled into somehow downloading a complex malicious program on their devices since January 2013,. Here’s why the iPhone ‘Masque Attack’ security flaw is so scary. We tested several apps and found that some of the popular iOS apps do not employ data encryption for their databases, writes.
dustindecker.org
Network Security Assessment | 1 On 1 Security
http://www.dustindecker.org/assessments
About 1 On 1. Raquo; Our Services. Raquo; Network Security Assessment. On Thu, 10/16/2014 - 20:52. Following a flexible yet methodical life cycle, we perform the same types of blind reconnaissance against your organization's technology that cyber criminals might employ. Then we assess the environment we see, find exploits that let us in, and determine the root cause. We address correction during a remediation phase, perform further risk assessment, and then report our findings.
dustindecker.org
Malware | 1 On 1 Security
http://www.dustindecker.org/taxonomy/term/7
About 1 On 1. Sony Pictures computer system down after reported hack. Sony Pictures Entertainment said its computer system was down for a second day on Tuesday, following media reports of a major hacking attack aimed at the film and television studio. Newly Discovered Sophisticated Malware Has Been Spying on Computers for Six Years. Complex Android malware believed to have infected up to 4.5M smartphones in the U.S. As many as 4.5 million American Android. A federal court has temporarily shut down and fr...
dustindecker.org
Anonymity | 1 On 1 Security
http://www.dustindecker.org/taxonomy/term/16
About 1 On 1. Human rights organizations launch free tool to detect surveillance software. It scans a person's computer for traces of surveillance software, or spyware. Anonymous 101: The Basics of Computer Security. So you want to be Anonymous?
dustindecker.org
Password | 1 On 1 Security
http://www.dustindecker.org/taxonomy/term/25
About 1 On 1. Citadel malware attacking open source password managers. IBM’s Trusteer researchers have discovered a new configuration of the Citadel malware that attacks certain password managers. The configuration activates key logging when certain processes are running on the infected machine. The malware is designed to steal the "master password" that protects access to the database of the end-user's passwords. Password Security - Part 1. Take the 1st character of each word; new strong password.
dustindecker.org
Organizational Security | 1 On 1 Security
http://www.dustindecker.org/taxonomy/term/5
About 1 On 1. Raquo; Organizational Security. Balancing Risk and Performance: Managing Firewalls Shouldn't Push Risks to the Extreme. Some people make a living taking extreme risks. Big mountain skiers, red rock mountain bikers, free climbers, wing-suit flyersthe list goes on and on. The skill levels and creativity of today’s extreme athletes are truly remarkable. Margins of error are miniscule, and consequences can be dire. Over a third of orgs have no real-time insight on cyber risks.
SOCIAL ENGAGEMENT