search
top
Currently Browsing: Information Security

Domain Registry Scam by giv.com

There has been a domain scam particularly in Canada that has been going on for quite awhile. When I was introduced to it taking place and being a person, they also tried to target. I decided it would be best to expose how they try to scam people so that people do not fall prey to them. I have heard stories of people falling for this scam. This post is for the ones that end up landing on this blog post for more info.

Why is this important

Personally, reading all the comments and posts online about these scammers. I feel the right thing to do is to create some awareness, so more people do not fall prey to the scam. There are many innocent victims, who may fall for this scam due to the lack of cyber security awareness. So, lets go out there and educate people and let them know about this scam. Hopefully, it can at least prevent a few people from falling prey to this scam.

What did they do

This organization is sending thousands of letters on an ongoing basis to people. These mailed letters show up at your home or offices and make it seem like it is an urgent matter to address right away. The letter will state a domain name you own, the expiry date of the domain, a section to paste your credit card number, and an envelope the mail the form back.

Read more Of This Post

Azure – Security Best Practices

Azure Security Best Practices – Part 1

Hello and welcome again!

This time around, I’ve decided to make this blog post as a Part 1 of many several parts that will be released. There is just too much Azure security information to put up in a single post. So, my plan is to make multiple posts over time.

Azure has many great security features that not everyone may be aware of right from the start. This post will focus on some key areas of Azure, and how it can better enhance the security of the environment. Key focus will investigate security best practices for Azure.

Read more Of This Post

Attending the BCAware Security Conference


Meeting Brian Krebs at the BCAware Conference

One of the most exciting parts of the BCAware conference was getting to meet Brian Krebs live in person!

During his talk he shared some interesting topics such as how cyber criminals are using websites similar to https://haveibeenpwned.com/  

Except, that these “other” websites will actually list out the users leaked password(s) in plaintext. And, with this method attackers can now attack various social media, banking and other commonly used services online to possibly find valid emails/passwords to accounts.

Another topic was related to how cyber criminals determine how much money to ask for during a ransomware attack. The typical amount seems to point at about 10% of total revenue a business makes from the previous year. This way, they do not ask for too much or too little. It gets close to an amount that the organization can afford, and finds would be cheaper than to recover from backups or rebuilding the environment.

Read The Full Post

Passing the GCIH Exam

I’m proud to announce that I have now obtained my SANS – GIAC GCIH certification. It was a long process, and I pushed myself to get it done before the start of the New Year – 2020.

New SANS GIAC changes to exams

One thing that was particularly new for me compared to the other 2 SANS exams I’ve done was the lab questions. SANS with GIAC now has added a section that tests your knowledge through a virtual lab. Now, I have to say I think it’s actually pretty awesome! It puts your real world skills to the test to see if you can actually can apply needed practical skills. It also gives companies assurance that their employees are also getting and being tested on real hands on work and not just theory based topics.

Read more Of This Post

Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell

Stealing Windows Wi-Fi WPA2-PSK Passwords through PowerShell

This week, I was hanging out with a friends, who happened to forget their Wi-Fi Password to connect a new device to their network. I decided, I would find a way and help them out so they could obtain the Wi-Fi password. It then led me to a thought, that a malicious attacker could technically use the same technique. Or, that it could be a good technique used when pen testing an environment. So, therefore, I have decided to make a blog post about it. Enjoy!

Read more Of This Post!

« Previous Entries Next Entries »

top