CISSP Education updates
Operating as usual
bbc.com Swann Security acknowledges it sent clips from inside a family's home to the wrong person's app.
motherboard.vice.com On Monday MyHeritage announced a security researcher had uncovered tens of millions of account details for recent customers, including email addresses and hashed passwords.
zdnet.com A serious vulnerability utilizes malformed Git repositories to remotely execute code on victim PCs.
zdnet.com This new version of the botnet uses exploits instead of brute force attacks to gain control of unpatched devices.
packetstormsecurity.com Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
arstechnica.com US Attorney: "The sentence imposed reflects the seriousness of hacking for hire."
motherboard.vice.com A hacker took control of Ticketfly's website and claims to have stolen the company's customer database.
New SMB Worm Uses Seven NSA Hacking Tools. WannaCry Used Just Two
bleepingcomputer.com Researchers have detected a new worm that is spreading via SMB, but unlike the worm component of the WannaCry ransomware, this one is using seven NSA tools instead of two.
WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom
thehackernews.com Use wanakiwi to get wannacry decryption keys and unlock ransomware without paying ransom
An Analysis of the WANNACRY Ransomware outbreak
securingtomorrow.mcafee.com Charles McFarland was a co-author to this blog Over the course of Friday the 12th of May we received multiple reports of organizations across multiple vert
Microsoft releases emergency patch for 'crazy bad' Windows zero-day bug
zdnet.com The vulnerability has been dubbed the worst Windows remote code execution flaw in recent memory.
Inside The Million-Machine Clickfraud Botnet | Bitdefender Labs
labs.bitdefender.com Online advertising is a multi-billion dollar business mostly ran by Google, Yahoo or Bing via AdSense-like programs. The current generation of clickbots such as the Redirector.Paco Trojan have taken abuse to a whole new level, burning through companies’ advertising budget at an unprecedented pace.
Physical acquisition of a locked Android device
weare4n6.com So, you got a locked Android device. What’s next? Is USB debugging enabled? No, it’s not. But still, there is a solution. Today our patient will be a locked Samsung GT-I9300 smartphone.…
Tor vs the NSA .pdf / by: Nicky van Rijsbergen and Kevin Valk
Knock Knock! Unique new backdoor Trojan infecting computers
scmagazine.com Backdoors normally implement remote control tool TeamViewer in order to get unauthorised access to an infected computer.
Symantec probe exposes how high profile Twitter accounts were hacked
bignewsnetwork.com A new probe by cyber-security firm Symantec has revealed that about 2500 high profile Twitter accounts were compromised
Most of PC users still don’t know how dangerous ransomware is
2-spyware.com Though cyber criminals have been on a roll releasing various ransomware viruses in recent years, surprisingly, there is still a significant number of Internet users
Widely-used patient care app found to include hidden 'backdoor' access
zdnet.com Anyone with the hard-coded credentials can obtain and modify sensitive patient data — many of which are about to, or have recently been in surgery.
Clipboard poisoning attacks on the Mac
Serpent-like malware targets your bank account
cnbc.com New malware has already been used against banks in the U.S., Canada and Europe, bilking customers out of about $4 million.
Ingenious attack mixes memory deduplication with Rowhammer
How security standards help companies prioritize data protection
searchcompliance.techtarget.com In part one of this blog post, John Pescatore, director at the nonprofit cybersecurity training provider SANS Institute, delved into the legal challenges c
Rogue Google browser extension found spying on users
v3.co.uk Malicious iCalc extension was downloaded close to 1,000 times
DDoS world record broken with 500Gbps attack in 2015
v3.co.uk Cloud service attacks and cyber extortion set to rise in 2016, says Arbor Networks report
10 Steps To Defeat Hacking Attacks (And What To Do After You’ve Been Hacked)
fossbytes.com In 3rd article of Steps to Effective Security series, I'll tell you 10 steps to defeat hacking attacks and what to do after you've been hacked.
Adobe releases nearly 70 security updates for Flash, Reader, and Acrobat
grahamcluley.com Adobe has released 69 security updates to address multiple vulnerabilities found in its Flash, Reader, and Acrobat applications. Make sure you update your systems as quickly as possible to protect against the critical flaws.
Researcher turns tables, discloses unpatched bugs in Google cloud platform
Bugs give hackers beachhead to attack Google App Engine, run malicious code.
arstechnica.com Bugs give hackers beachhead to attack Google App Engine, run malicious code.
Malicious docs submitted to CareerBuilder job listings distribute malware
scmagazine.com Proofpoint researchers observed attackers submitting weaponized Microsoft Word documents for job postings listed on the CareerBuilder website.
Ryanair hack sees €4.6m stolen and sent to Chinese bank account
v3.co.uk Airline calls in Criminal Assets Bureau and is confident of retrieving the cash
Mozilla to whack HTTP sites with feature-ban stick
theregister.co.uk Insecure sites relegated to Firefox Stone Age
Specialize in teaching Teens & Adults how to drive safely, having served over 200 individuals. Ability to pick up, drop off, and car available for DMV test
Kids Quest Club provides opportunities for the kids to explore STEM education, financial management, leadership development and public speaking skills.
Currently tutoring students in pre-algebra, geometry, algebra II with trig, math analysis and pre calculus
💻 Computer Classes - Virtual & In Person 📋 IT Certifications - Youth & Adult 🏕️ Camps - Virtual & In Person 🎉 Birthday Parties
"Swaram" to me is all about singing together and having fun. It is a place to connect with children and adults of similar interest in music. I look forward to the time to sing with the kids and have fun.
TigerDen is the biggest martial arts school in Northern Virginia! We teach traditional Korean martial arts and offer after school care.
This is a page for CAMPUS Program Alumni to connect with our current CAMPUS students and Mr. Clarke.
The Medical Learning Center is a local leader in healthcare education with over 15 years of service to the Loudoun County Community.
Eye Level, the global leader in self-directed learning, nurtures and promotes effective study practices for lifelong academic goals.
LCPS Student Assistance Services