Welcome to my blog
Currently Browsing: Security

How to Upgrade Kali Linux to Latest Version (1.1.*)

Hello there, in this post I am going to write the upgrade procedures for Kali Linux to the latest version as I did in my lab environment. I would like to inform you that these steps may change according to your environment. In my case, I upgraded from 1.0.7 x64 version to 1.1.0 x64. Let us start; Backup the current apt source list file as follow. cp /etc/apt/sources.list /etc/apt/sources.list.backup Open the...

Data Recovery: Best Practices

OVERVIEW Computer service centers encounter failed hard drives. Data recovery can be arevenue source, but it must be wisely and carefully done. Well-intentioned but ill-informed efforts and practices can reduce or even ruin the prospects for successful recovery, and they can even expose the provider to legal liability. As in medicine, the main precept of data recovery is “first, do no harm.” The purpose of this...

18,000 HMSA members’ information hacked

At least 18,000 Hawaii Medical Services Association members may have had their personal information accessed in a cyber attack on the Anthem Inc. A post on the HMSA website says users who received services from Anthem over the last 10 years could have had their information accessed. The number of affected members could be as high as 20,000 as the organization processes 2,000 unknown names. The information that may...

BadUSB attack and the Industrial control systems

Industrial control systems are in danger of being hacked by using a modified version of the BadUSB attack says Michael Toecker in his presentation at the Security Analyst Summit 2015 in Cancun. Not that long ago, BadUSB swept across the cybersecurity community as one of the hottest hacks of the year. BadUSB featured the ability to modify the firmware of USB controller chips of many USB devices, with focus mainly on...

Shodan Founder finds 250,000 routers sharing same SSH keys

The Founder of Shodan John Matherly was revamping the SSH banner when discovered a large number of devices that share same SSH keys. The Founder of Shodan, John Matherly, has conducted in December 2014 a personal research discovering that more than 250,000 routers used in Spain and deployed by Telefonica de Espana, and thousands more used in other countries worldwide are using the same SSH keys Matherly was...

« Previous Entries Next Entries »

Powered by WordPress | Designed by Elegant Themes