I was greeted this morning by an article by Marc Saltzman for USA Today in my Apple News feed. The article posted under Cybersecurity was titled "Why college students need to use a VPN – and how to pick the right one". While it is a well written article that makes it's case by pointing … Continue reading Students: Prioritize your risks!
Sending Cryptocurrency from Bread to Coinbase
Sending cryptocurrency from the Bread wallet app on a smartphone to Internet based Coinbase wallet is very easy. Maybe the hardest part of the transaction is entering your PIN. I wrote this post using the Bread app version 4.12.1 Build 1 on iPhone . I used the Coinbase web application on a PC so there … Continue reading Sending Cryptocurrency from Bread to Coinbase
PayPal does Crypto
If you are looking to get started in cryptocurrencies like Bitcoin and Ethereum you may have noticed that long time online payment application PayPal now offers crypto. If you are looking at crypto as an investment that you are planning to buy, hold, hope for increase in value and then sell; PayPal may be for … Continue reading PayPal does Crypto
“the courts often don’t take these offenses seriously”
The title of this post is a quote from Mark Rasch, a former federal prosecutor with the U.S. Justice Department regarding sentencing guidelines that saw an admitted criminal receive a sentence of time served.. Brian Krebs published an article today concerning the sentencing of admitted criminal Peter “Severa” Levashov. In short, Levashov was sentenced to … Continue reading “the courts often don’t take these offenses seriously”
Quantitative CyberSeek
As a cybersecurity educator one of the core concepts that I try to relate to students is the ability to differentiate between qualitative and quantitative data. While to some it may seem a simple distiction between two forms of measurement; from my perspective as an educator it is not. While both forms of data are … Continue reading Quantitative CyberSeek
The Ford Mustang
I'm a fan of the Ford Mustang. I own two Mustangs; a 2005 GT Coupe and a 2006 GT Convertible. My parents and I attended the World's Fair where Ford introduced the Mustang back in April of 1964. This past weekend Ford and Mustang enthusiasts like myself celebrated the brand turning 57! If you are … Continue reading The Ford Mustang
What is Golden SAML?
The Golden SAML threat vector enables an attacker to create a forged SAML “authentication object,” and authenticate across every service that uses SAML 2.0 protocol as an SSO mechanism. In a golden SAML attack, the attacker can gain access to any application that supports SAML authentication (e.g. Azure, AWS, vSphere, etc.) with any privileges they … Continue reading What is Golden SAML?
Secure Networks Vidcast with Mike Morris from Endace
I had the fantastic opportunity to have a recorded video chat (a vidcast) with Mike Morris the Global Director of Business Development at Endace recently. Endace is in my mind the market leader when it comes to network packet capture solutions. They have really evolved network packet technology from its roots in open source TCPdump … Continue reading Secure Networks Vidcast with Mike Morris from Endace
Amazingly Great Read: Gates and Ladders
Before I was a programmer. Before I was a network expert. Before I was an educator. I was a car guy. Due to all these other things in my life I never got as deep into auto mechanics as others. Reading about and working on my cars has always been a great distraction from Internet … Continue reading Amazingly Great Read: Gates and Ladders
Inference, Aggregation, and Safe Cracking
I'm studying for the CISSP exam. Inference and aggregation are means used to take low level or partial information and use that to derive higher level information. Inference requires deduction. The lower level information provides clues. Aggregation is a mathematical or mechanical process. Apply inference and aggregation to safe cracking (or lock picking). Using inference … Continue reading Inference, Aggregation, and Safe Cracking