Telecom Tidbits
Jared's Network and Security Blog
  • Home
  • Telecom Corner
  • About
  • Contact
  • Donate
  • Site Index
  • Links

Vulnerabilities with Movie Subtitles

May 24, 2017 Jared Hall Internet Security, Microsoft Windows No Comments

Check Point Software Technologies has uncovered vulnerabilities in the processing of Subtitles with the four most popular movie players for Windows and Linux systems: VLC Kodi Popcorn-Time Stream.io Hackers can exploit Subtitle ranking algorithms and allow exploited subtitles to be delivered first.  The instant the subtitle is loaded, the hacker is able to perform Remote […]

More

New USB Kill 3.0: From the makers of USB Kill™

May 23, 2017 Jared Hall General No Comments

A long time ago, I posted a comment on #FB regarding USB Hardware Kill Sticks to an audience of disbelievers.   So, as I’m trolling the ‘Net, I came across a legitimate manufacturer of such devices, aptly named: https://www.usbkill.com/; complete with a valid SSL certificate and secure shopping cart.  Kudos to them for some great advertising on […]

More

BOLO: Chrome Spreads Your Creds!

May 22, 2017 Jared Hall BOLOs, Internet Security 1 Comment

There is a vulnerability that exists in the current version of Google’s Chrome browser that can allow your Windows Login, or Network Login, credentials to be pilfered by a remote hacker. The problem occurs by having Chrome download a harmless .SCF file.  These files are very much like the .LNK files of old.  SCF stands […]

More

Big Data vs. Big Oil: Technology Company Value

May 19, 2017 Jared Hall General No Comments

So, what is a barrel of bits trading for these days? Apparently, a lot more than a barrel of oil. The Economist brings up an interesting look at the big high tech industry and makes some startling revelations regarding the absolute, dominating wealth of some of the world’s most wealthiest technology companies; including Google, Apple, […]

More

The Cybersecurity Framework

May 18, 2017 Jared Hall General, Internet Security No Comments

Introduction In 2014, in response to an Executive Order from President Obama, the National Institute of Standards completed “Framework for Improving Critical Infrastructure Cybersecurity“, also known as “The Cybersecurity Framework“.  The framework looks like a “Bow Tie”, from NISTIR 8170: The Framework’s five functional components are: ID: Identify PR: Protect DE: Detect RS: Respond RC: Recover […]

More

Demystifying President Trump’s CyberSecurity Executive Order

May 17, 2017 Jared Hall General, Internet Security No Comments

It didn’t take President Trump long to weigh-in on Federal Government CyberSecurity. And it took even less time for all kinds of company “Talking Heads” to issue their own self-serving versions of the Executive Order. There isn’t much there. No move to the “cloud”. No massive consolidation of resources into a massive Government data silo. No […]

More

Mr. Smith Goes to Washington

May 16, 2017 Jared Hall Microsoft Windows, Spy vs. Spy No Comments

Following the latest variant of the WannaCry(pt) RansomWare that spread throughout the globe last weekend, Microsoft’s President and Chief Legal Officer, Brad Smith, blew a gasket. He argues, “Repeatedly, exploits in the hands of governments have leaked into the public domain and caused widespread damage. An equivalent scenario with conventional weapons would be the U.S. military […]

More

Help for MalWare & RansomWare?

May 14, 2017 Jared Hall Internet Security, Microsoft Windows No Comments

The best way to stay safe in today’s world is to know the equipment that your using. Mostly, good common sense is all that is needed. But if you’ve been infected with RansomWare, you’re probably doomed and need to restore from backup. The keyword here is “probably“. In cases where a cryptographic hashing function has […]

More

BOLO: WannaCry(pt) RansomWare

May 13, 2017 Jared Hall BOLOs, Internet Security, Microsoft Windows, Spy vs. Spy No Comments

First observed in February the WannaCry, or WannaCrypt, virus is wreaking havoc in European networks. Major outbreaks of a new variant were first detected Friday, 5/12/2017 in Spain but it has now traveled to over 99 countries. It also took out England’s National Health Service (NHS). The virus is web-based and spreads from users clicking […]

More

BOLO: Netrepser Espionage Trojan

May 13, 2017 Jared Hall BOLOs, Internet Security, Microsoft Windows, Spy vs. Spy No Comments

Netrepser is a JavaScript (JavaScript ≠ Java) Trojan designed for espionage purposes. This was detected and reported by Bitdefender on May 5, 2017. Believed to be of Russian origin, the common distribution of this Trojan is by Email. However, its JavaScript nature suggests that this may be able to cause infections in web-based “Drive-By Download” […]

More

«‹ 9 10 11 12 ›»

Tools & Downloads

Download Center

Categories

Good Reads (PDF)

Recent Posts

  • A Pathetic Defense of Julian Assange
  • Damned if you do. Damned if you don’t.
  • ProtonMail? Not Worth an Electron!
  • Give it a REST: Serious WordPress Bugs
  • Hardening the Apache Webserver

Donate

$
Select Payment Method
Personal Info

Donation Total: $20.00

↑

  • Home
  • Telecom Corner
  • About
  • Contact
  • Donate
  • Site Index
  • Links
Temporal Based Intelligence © 2017