cybersecuritymave-techie.blogspot.com cybersecuritymave-techie.blogspot.com

cybersecuritymave-techie.blogspot.com

Cyber Security Maven -- Techie

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, January 6, 2015. Back in March 2014, I wrote an blog about the risks of BIOS Malware. Cert advisories regarding BIOS vulnerabilities:. I have NOT tested any of the updates/tools listed below - just providing what information I could find. These are the vendors that are known to be affected at this time. Monda...

http://cybersecuritymave-techie.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR CYBERSECURITYMAVE-TECHIE.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

July

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Saturday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.1 out of 5 with 14 reviews
5 star
9
4 star
2
3 star
1
2 star
0
1 star
2

Hey there! Start your review of cybersecuritymave-techie.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.7 seconds

FAVICON PREVIEW

  • cybersecuritymave-techie.blogspot.com

    16x16

  • cybersecuritymave-techie.blogspot.com

    32x32

  • cybersecuritymave-techie.blogspot.com

    64x64

  • cybersecuritymave-techie.blogspot.com

    128x128

CONTACTS AT CYBERSECURITYMAVE-TECHIE.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Cyber Security Maven -- Techie | cybersecuritymave-techie.blogspot.com Reviews
<META>
DESCRIPTION
Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, January 6, 2015. Back in March 2014, I wrote an blog about the risks of BIOS Malware. Cert advisories regarding BIOS vulnerabilities:. I have NOT tested any of the updates/tools listed below - just providing what information I could find. These are the vendors that are known to be affected at this time. Monda...
<META>
KEYWORDS
1 bios plot update
2 american megatrends incorporated
3 biosagentplus
4 may work
5 intel
6 posted by
7 dominique kilman
8 no comments
9 email this
10 blogthis
CONTENT
Page content here
KEYWORDS ON
PAGE
bios plot update,american megatrends incorporated,biosagentplus,may work,intel,posted by,dominique kilman,no comments,email this,blogthis,share to twitter,share to facebook,share to pinterest,why ir fails,team work,planning,the technical details,1 comment
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Cyber Security Maven -- Techie | cybersecuritymave-techie.blogspot.com Reviews

https://cybersecuritymave-techie.blogspot.com

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, January 6, 2015. Back in March 2014, I wrote an blog about the risks of BIOS Malware. Cert advisories regarding BIOS vulnerabilities:. I have NOT tested any of the updates/tools listed below - just providing what information I could find. These are the vendors that are known to be affected at this time. Monda...

INTERNAL PAGES

cybersecuritymave-techie.blogspot.com cybersecuritymave-techie.blogspot.com
1

Cyber Security Maven -- Techie: IR and the help desk

http://www.cybersecuritymave-techie.blogspot.com/2014/09/ir-and-help-desk.html

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, September 23, 2014. IR and the help desk. Get an email from the help desk saying that a user's machine has been infected with a Trojan (not just any malware, a Trojan! This time, they told me that they had gone into folder properties and set the 'Show Hidden Files.' option to true. But that the files ...That'...

2

Cyber Security Maven -- Techie: decode.py

http://www.cybersecuritymave-techie.blogspot.com/2014/07/decodepy.html

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, July 1, 2014. Seed = (seed1 * 0x343fd) 0x269ec3. NewSeed = seed and 0xffffffff. Ran = ( seed 16) and 0x7fff). Modifier = ran and 0xff. Return [newSeed, modifier]. Test2 = encoded payload (after the first 8). Seed = 0x2c4f5a543d6d6910 # first 8 of payload. NewTest = test2.split(' '). For i in range(0,72):.

3

Cyber Security Maven -- Techie: BIOS Plot Update

http://www.cybersecuritymave-techie.blogspot.com/2015/01/bios-plot-update.html

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, January 6, 2015. Back in March 2014, I wrote an blog about the risks of BIOS Malware. Cert advisories regarding BIOS vulnerabilities:. I have NOT tested any of the updates/tools listed below - just providing what information I could find. These are the vendors that are known to be affected at this time. Novem...

4

Cyber Security Maven -- Techie: Why IR Fails

http://www.cybersecuritymave-techie.blogspot.com/2014/10/why-ir-fails.html

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Monday, October 13, 2014. This is the world of incident response. And, for the most part - there is a lot that companies get right. But there are also a lot of ways that companies could improve to make this process more efficient. It all starts with the team itself:. 1 - People and staff management. Do you expect that...

5

Cyber Security Maven -- Techie: Decoding Vawtrak\NeverQuest Traffic

http://www.cybersecuritymave-techie.blogspot.com/2014/07/decoding-vawtrakneverquest-traffic.html

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Thursday, July 3, 2014. Decoding Vawtrak NeverQuest Traffic. This is not a post about the capabilities of this particular malware - this is about decoding the network traffic generated from an infected machine. StopMalvertising has a really nice write-up here: Analysis of vawtrak. Now that I had a memory address, I re...

UPGRADE TO PREMIUM TO VIEW 9 MORE

TOTAL PAGES IN THIS WEBSITE

14

LINKS TO THIS WEBSITE

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: Folding displays becoming a reality

http://cybersecuritymaven.blogspot.com/2011/05/folding-displays-becoming-reality.html

Thursday, May 19, 2011. Folding displays becoming a reality. Researchers at Samsung Advanced Institute of Technology have built a prototype for a foldable display. They tested the prototype to see if folding/unfolding would cause a visible degradation in the fold point. In their tests, after. 100,000 fold/unfolds there was a 6% degradation. If you check out the koala picture in this article. The only reason I could tell that it was a foldable display at all was the caption! San Antonio, TX. GREM, CREA - ...

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: May 2011

http://cybersecuritymaven.blogspot.com/2011_05_01_archive.html

Friday, May 20, 2011. Google fixes Android vulnerability. Google is rolling out a fix for a vulnerability in Android that could leak data from Google calendar and contacts. Android phone users were at risk when they are connected to unsecured wireless network. Android OS versions 2.3.3 and lower are affected by this. The Google spokesperson quoted in this article. Thursday, May 19, 2011. Folding displays becoming a reality. Then I could take my 32' monitor with me when I travel. Once you get to your ...

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: January 2011

http://cybersecuritymaven.blogspot.com/2011_01_01_archive.html

Saturday, January 29, 2011. What have you shared on facebook? Ever wonder what you've really shared on facebook? Facebook now has an option for users to download their account information:. From the facebook site:. This is a copy of all of the personal information you've shared on Facebook. In order to protect your information, we will ask for authentication to verify your identity. Learn More about downloading a copy of your information. If you have made comments on other people's posts - those don't sh...

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: August 2009

http://cybersecuritymaven.blogspot.com/2009_08_01_archive.html

Thursday, August 27, 2009. Security 610: Reverse-Engineering Malware: Malware Analysis Tools and Techniques. I will be mentoring SANS 610: Malware Analysis in San Antonio starting Nov 3rd. The class covers both behavioral and code analysis to provide a more rounded approach to malware reverse engineering. For more information or to register. SANS 610. Tuesday, August 25, 2009. Network word has put together a list of " Unwritten Rules of Technology. Basically the Murphy's Laws of the tech world. When ente...

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: Sprint Airave

http://cybersecuritymaven.blogspot.com/2011/02/sprint-airave.html

Friday, February 4, 2011. After I got that fancy new phone I have been playing with for almost 2 weeks now, the lack of cellular coverage in my house really started to get to me. I blame it on the radiant barrier that keeps the house energy efficient. basically, its like covering the house in tinfoil! A friend told me that he had similar problems, called Sprint and they sent him this nifty device that would plug into the internet connection in the house and create a sort of personal cell tower inside&#46...

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: October 2009

http://cybersecuritymaven.blogspot.com/2009_10_01_archive.html

Friday, October 2, 2009. A guy robbing a house in West Virginia decided that facebook. Just couldn't wait. While in the house, he used the owner's computer to sign in and check facebook. Too bad for him that he left his account signed in when he made his escape! Addiction has its uses :). Subscribe to: Posts (Atom). San Antonio, TX. I am a Cyber Security consultant currently residing in San Antonio, TX. I have been involved in computers since I was 10 when my dad taught me how to program!

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: My assessment of scorpion episode 1

http://cybersecuritymaven.blogspot.com/2014/10/my-assessment-of-scorpion-episode-1.html

Monday, October 6, 2014. My assessment of scorpion episode 1. I know that many others have already written about the technical inaccuracies in CBS' new show scorpion, but I felt that I had to get my critique out there as well. For anyone who hasn't seen the promos, the show, or anything else - Scorpion. Wait a minute - - these planes that could not be diverted have been circling airports for 40 minutes waiting for landing instructions. After about 20 minutes, wouldn't you think to go somewhere else?

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: December 2010

http://cybersecuritymaven.blogspot.com/2010_12_01_archive.html

Monday, December 20, 2010. Got to start them early! Subscribe to: Posts (Atom). San Antonio, TX. I am a Cyber Security consultant currently residing in San Antonio, TX. I have been involved in computers since I was 10 when my dad taught me how to program! I have focused in cyber security since 2002. My current areas of interest are Malware Detection and Reverse Engineering. GCFA - Forensics from SANS. CISM - information sec management. GREM, CREA - reverse engineering certs. GSAE - auditing, from SANS.

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: October 2014

http://cybersecuritymaven.blogspot.com/2014_10_01_archive.html

Monday, October 6, 2014. My assessment of scorpion episode 1. I know that many others have already written about the technical inaccuracies in CBS' new show scorpion, but I felt that I had to get my critique out there as well. For anyone who hasn't seen the promos, the show, or anything else - Scorpion. Wait a minute - - these planes that could not be diverted have been circling airports for 40 minutes waiting for landing instructions. After about 20 minutes, wouldn't you think to go somewhere else?

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven: September 2011

http://cybersecuritymaven.blogspot.com/2011_09_01_archive.html

Thursday, September 8, 2011. Cars tweeting, posting on facebook? Article, cars are being equipped with all kinds of computer systems to allow: "Automobiles are getting smarter as carmakers put in computers that can help drivers parallel park and add Internet connectivity to post Facebook or Twitter updates". I wonder if this would change my insurance rates? I would assume that the car would be less likely to hit another car while it was auto-parking. But twitter and facebook posts? The article then goes ...

UPGRADE TO PREMIUM TO VIEW 10 MORE

TOTAL LINKS TO THIS WEBSITE

20

OTHER SITES

cybersecuritymanagement.net cybersecuritymanagement.net

cybersecuritymanagement.net

cybersecuritymanifesto.com cybersecuritymanifesto.com

Cyber Security Manifesto

CYBER SECURITY MANIFESTO 2.0. October 1st, 2012 Comments Off. Access to an Open Internet is a fundamental human right. The survival of our economic model now depends on an a mere Internet connection. We are all becoming our organization’s Chief Information and Security Officer, sharing the responsibility for cyber security. Cyber crimes and traditional crimes must be treated equally. Security is first and foremost a business discussion about risk, probability and consequences. Beware of what you create!

cybersecuritymarket.com cybersecuritymarket.com

Cybersecurity Market | Cybersecurity Technologies & Markets

Skip to primary navigation. Skip to primary sidebar. Cybersecurity Technologies and Markets. The State of the SOC Report Finds Excessive Alerts, Outdated Metrics, and Limited Integration Lead to Over-taxed Security Operations Centers. March 22, 2018. As the threat landscape changes and enterprises move to adopt additional layers of defensive technologies, SOCs are being overwhelmed by the sheer volume of alerts and the number of investigations that require their attention. Furthermore, the study, fou...

cybersecuritymasterclass.com cybersecuritymasterclass.com

Cyber Security Masterclass

cybersecuritymastersdegree.org cybersecuritymastersdegree.org

Online Masters Degree in Cybersecurity | Guide to Cybersecurity Graduate Programs

Graduate Degrees in Cybersecurity. No organization is immune to the threat of cybercrime. Experienced teams of master’s-educated cybersecurity experts continue to hold the line between secure data and the criminals looking to exploit it. Find out how you can earn your master's degree in cybersecurity online. Online Master's Degree Programs in Information and Network Security. Find Info For Your State. DHS and NSA Designated Cybersecurity Graduate Programs. In addition to achieving regional or national ac...

cybersecuritymave-techie.blogspot.com cybersecuritymave-techie.blogspot.com

Cyber Security Maven -- Techie

Cyber Security Maven - Techie. This is the more techie/geeky side of my blog. This is where I will post about new tools I like, new ways to look at malware, some exploits - stuff like that! Tuesday, January 6, 2015. Back in March 2014, I wrote an blog about the risks of BIOS Malware. Cert advisories regarding BIOS vulnerabilities:. I have NOT tested any of the updates/tools listed below - just providing what information I could find. These are the vendors that are known to be affected at this time. Monda...

cybersecuritymaven.blogspot.com cybersecuritymaven.blogspot.com

Cyber Security Maven

Monday, October 6, 2014. My assessment of scorpion episode 1. I know that many others have already written about the technical inaccuracies in CBS' new show scorpion, but I felt that I had to get my critique out there as well. For anyone who hasn't seen the promos, the show, or anything else - Scorpion. Wait a minute - - these planes that could not be diverted have been circling airports for 40 minutes waiting for landing instructions. After about 20 minutes, wouldn't you think to go somewhere else?

cybersecurityme.com cybersecurityme.com

Cyber Security Me -

How To Cut The Cord From Cable. May 30, 2017. Penny Auction Bidding Mistakes You Have to Avoid. May 5, 2017. Own Product Or Promote Someone Elses? May 5, 2017. How to Know When You Need To Upgrade Your Hosting. January 13, 2017. How To Cut The Cord From Cable. Penny Auction Bidding Mistakes You Have to Avoid. Own Product Or Promote Someone Elses? How to Know When You Need To Upgrade Your Hosting.

cybersecuritymedia.com cybersecuritymedia.com

Cyber Security in New Media Forum

Cyber Security in New Media Forum. Sign Up for Updates. Cyber Security in New Media Forum. The Cyber Security in New Media Forum conference has been postponed, please check back for further details. 8220;[Cyber Security is] one of the most serious economic and national security challenges we face as a nation, but one that we as a government or as a country are not adequately prepared to counter”. 8211; Obama Administration. 8211; Shane Sims, PWC. Share This on Your Favorite Social Network.

cybersecuritymentor.org cybersecuritymentor.org

Home

Email us for the correct answer at info@cybersecuritymentors.com. With tax season among us, the opportunity for scammers to use specific tactics to steal your identify, defraud you in giving money and obtaining sensitive information is in full swing. Test3, consectetur adipiscing elit. Vivamus mollis dignissim lacus eu posuere. Nullam viverra accumsan dui eleifend condimentum. Phasellus quam nulla lipsumu dolor. Get update information on viruses, phishing, social engineering and other security topics.

cybersecuritymentors.com cybersecuritymentors.com

Home

April 2, 2017. Your Cyber Security Mentors. Mentor Joseph Dyer, CISSP…. Jan 26, 2015. Slider US Solar Grow. Odio deserunt ea, mlkshk Banksy delectus. Odio deserunt ea, mlkshk Banksy delectus. How To Set Realistic. Odio deserunt ea, mlkshk Banksy delectus. What Can Seasoned En. Odio deserunt ea, mlkshk Banksy delectus. Slider US Solar Growth Continues Gigawatts of PV Installed. Gadget Ogling Falling Apples and Magical Pancakes Apple Drifts Away From Jobs. The Walking Dead's Latest…. Jan 26, 2015. Google d...