Push's Thoughts
Follow
460 views | +0 today
 
Rescooped by Jason Toy from Communication and Autism
onto Push's Thoughts
Scoop.it!

ASDCulture - Grief and ASD

ASDCulture - Grief and ASD | Push's Thoughts | Scoop.it

Via Communica8GH
Jason Toy's insight:

Really interesting article for those that have family or friends with ASD in their lives. Not saying I agree 100% with the article but it was a good read with some decent information.

more...
Communica8GH's curator insight, July 15, 2013 5:55 AM

Differences in grief expression does not mean lack of empathy or caring.

From around the web

Push's Thoughts
Your new post is loading...
Your new post is loading...
Scooped by Jason Toy
Scoop.it!

Apple Pay rival CurrentC hacked | ZDNet

Apple Pay rival CurrentC hacked | ZDNet | Push's Thoughts | Scoop.it
CurrentC, the merchant's answer to NFC payment systems, has been hacked during its pilot program.
Jason Toy's insight:

Yeah, I think everyone has kind of seen this coming.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

Social Security numbers, addresses of 18800 state workers in missing thumb drive - The Denver Channel

Social Security numbers, addresses of 18800 state workers in missing thumb drive - The Denver Channel | Push's Thoughts | Scoop.it
Social Security numbers, addresses of 18800 state workers in missing thumb drive
The Denver Channel
Should you need any further information, please contact the Office of Information Security at infosec@state.co.us." Copyright 2013 Scripps Media, Inc.
Jason Toy's insight:

This really does go to show that it is not the security protocols, it is not the firewalls, nor is it the intrusion detection/prevention systems that need hardened. I say that because the user and their practices can always find a way to circumvent an entire system.

more...
No comment yet.
Rescooped by Jason Toy from High Technology Threat Brief (HTTB) (1)
Scoop.it!

Deep Dive into a Custom Malware Packer - InfoSec Institute

Deep Dive into a Custom Malware Packer - InfoSec Institute | Push's Thoughts | Scoop.it

Introduction In this article we will look in depth at a Custom Packer used by a Malware that was recently found in the wild. This packer is interesting for several reasons.


Via Daniel A. Libby, CFC
Jason Toy's insight:

If you are going to pen test or do vulnerability assessments it really helps to know this at this level.

more...
No comment yet.
Rescooped by Jason Toy from Information Security
Scoop.it!

Infosec forum hacked, foists malware via IE zero-day

Infosec forum hacked, foists malware via IE zero-day | Push's Thoughts | Scoop.it
An infosec forum was hacked and implanted with malware that hit users with drive-by attacks via a Internet Explorer zero-day. 

 

===> Stay off IE until patch released!!! <===

 


Via Gust MEES, Paul Misner
Jason Toy's insight:

Oh Internet Explorer how I loath you.

more...
Gust MEES's curator insight, November 14, 2013 6:23 AM

 

===> Stay off IE until patch released!!! <===

 

Paul Misner's curator insight, November 14, 2013 11:39 AM

This can be avoided by taking the browser off the desktop,  ala Spikes. See an interview with Spikes CEO, Branden Spikes at http://goo.gl/m2Vg8w

Rescooped by Jason Toy from InfoSec Focus
Scoop.it!

Women Utterly Destroy Men in Social Engineering Competition

Women Utterly Destroy Men in Social Engineering Competition | Push's Thoughts | Scoop.it
Women Utterly Destroy Men in Social Engineering Competition
PC Magazine
For the past five years, Chris Hadnagy, Chief Human Hacker at Social-Engineer, Inc, has run an unusual competition at Def Con.

Via Kalani Kirk Hausman
Jason Toy's insight:

This is hilarious..and sad because it is so very true. I think we should have a competition like this at the office!  

more...
No comment yet.
Rescooped by Jason Toy from InfoSec Focus
Scoop.it!

Security's weakest link: Technology no match for social engineering

Security's weakest link: Technology no match for social engineering | Push's Thoughts | Scoop.it
Security's weakest link: Technology no match for social engineering TechRepublic (blog) The contest itself is organized by Social-Engineer Inc, a team sponsored by many security groups, and which hosts this event at the security conference every...

Via Kalani Kirk Hausman
Jason Toy's insight:

As long as people would rather not be bothered, as long as clicking a link is "easier" than researching, as long as it remains "not my problem" social engineering will always win out. Educate yourself and your workers. If you are going to be a social engineering statistic, be that of the small percent that recognized and avoided the compromise

more...
No comment yet.
Rescooped by Jason Toy from Startups in South Europe
Scoop.it!

Juniper Unveils MetaFabric Architecture - IT Business Edge (blog)

Juniper Unveils MetaFabric Architecture - IT Business Edge (blog) | Push's Thoughts | Scoop.it
Juniper Unveils MetaFabric Architecture IT Business Edge (blog) Seeing this as an opportunity to usurp long-standing rivals, Juniper Networks today unveiled a MetaFabric architecture based on the software-defined networking (SDN) controller...

Via Jean-Charles Labbat
Jason Toy's insight:

Very interesting reading on software-defined networking and Juniper is staying out in front of it.

more...
Jean-Charles Labbat's curator insight, October 30, 2013 4:21 AM

Mets ta fabric (dans to DataCenter)... Enfantin... à dire mais aussi à faire. La nouvelle Architecture METAFABRIC de Juniper permet de commencer petit et de grandir tres rapidement sans difficulté grâce à l'unification du Virtual Chassis et de QFabric, et l'utilisation de SDN - à considérer pour tout Datacenter (sans modération) ;-)

Rescooped by Jason Toy from Information Security Tips For Consumers
Scoop.it!

No password is safe from new breed of cracking software

No password is safe from new breed of cracking software | Push's Thoughts | Scoop.it

Over the weekend, the free password cracking and recovery tool oclHashcat-plus released a new version, 0.15, that can handle passwords up to 55 characters. It works by guessing a lot of common letter combinations. A lot. Really really fast.

Other long-string password-crackers exist, such as Hashcat and oclHashcat-lite, though they take a great deal more time to cycle through. This improvement runs at 8 million guesses per second while also allowing users to cut down the number of guesses required by shaping their attacks based on the password-construction protocol followed by a company or group.

A combination of increasing awareness of official scrutiny, such as the NSA leaks, growing instances of hacking of all kinds and leaked password lists, has inspired users to radically lengthen their passwords and use passphrases instead.

As Dan Goodin noted in Ars Technica, “Crackers have responded by expanding the dictionaries they maintain to include phrases and word combinations found in the Bible, common literature, and in online discussions.”


Via Amigo Omega
Jason Toy's insight:

Sadly most people use the same password for all of their accounts, I know it is more convenient but at what price? I know having all my accounts compromised at once would not be convenient for me!

more...
Jason Toy's curator insight, October 30, 2013 7:25 AM
Jason Toy's insight:

Sadly most people use the same password for all of their accounts, I know it is more convenient but at what price? I know having all my accounts compromised at once would not be convenient for me!

Rescooped by Jason Toy from Peer2Politics
Scoop.it!

Comment: Myths and Misconceptions on Securing Open-source Software - Infosecurity Magazine

Comment: Myths and Misconceptions on Securing Open-source Software - Infosecurity Magazine | Push's Thoughts | Scoop.it

Agile security expert Ryan Berg addresses the common myths and misconceptions of securing open-source software and offers practical tips on how to build in security throughout the software development lifecycle – from design, development and deployment through to production


Via jean lievens
Jason Toy's insight:

So many organizations and the people within those organizations still see hefty price tags correlating into performance. That really is just not the case in some aspects such as Open-Source tools.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

InfoSec Management for Practices Physical & Technical Safeguards for HIPAA Security Rule Compliance

Jason Toy's insight:

Interesting and informative video. Really nothing new, all common sense stuff, but worth the watch if you are in healthcare IT.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

NSA locates cell phones even when switched off – report

NSA locates cell phones even when switched off – report | Push's Thoughts | Scoop.it
Never mind the non-stop collection of metadata and other sneaky surveillance tools being implemented by the US: a new report has revealed the National Security Agency’s spy powers allow the government to grab location data on just about anyone.
Jason Toy's insight:

This is never going to end....

more...
No comment yet.
Rescooped by Jason Toy from Communication and Autism
Scoop.it!

Creating a school for autistic adults, one student at a time

Creating a school for autistic adults, one student at a time | Push's Thoughts | Scoop.it
Editors Note: Dan Selec is the founder and CEO of the nonPareil Institute, a hybrid software company and school located in Plano, Texas that teaches adults on the autism spectrum to write and develop apps, video games and iBooks.

Via Communica8GH
Jason Toy's insight:

Love this! Taking what they are already interested in and amping it up!

more...
Marie Duggan's comment, July 27, 2013 12:19 AM
Love it! Way to go Dan! Keep up the good work!
Scooped by Jason Toy
Scoop.it!

Qualitative over Quantitative Data (Well at least you would hope so...)

Qualitative over Quantitative Data (Well at least you would hope so...) | Push's Thoughts | Scoop.it
When I am not doing the whole breaking into your network thing (at the customer's request mind you so calm down!!) you can generally find me messing with that analytics playground that is Splunk. S...
more...
No comment yet.
Rescooped by Jason Toy from ICT Security-Sécurité PC et Internet
Scoop.it!

Hackers Are Attacking Millions Of Computers And Demanding Ransom In Bitcoins

Hackers Are Attacking Millions Of Computers And Demanding Ransom In Bitcoins | Push's Thoughts | Scoop.it
There's a scary new computer virus called CryptoLocker that's spreading like mad.

Via Gust MEES
Jason Toy's insight:

At this point, if you work in or even remotely around IT, you have heard of this, hopefully you have not witnessed this first-hand, but this is a very real reason to ensure that your employees, family, YOU, are educated on why not to click the shiny link you just received that says you just won a new iPad!

more...
Scooped by Jason Toy
Scoop.it!

Python Programming Tutorial - Learn Python Online | Udemy

Python Programming Tutorial - Learn Python Online | Udemy | Push's Thoughts | Scoop.it
Python, Travelling via Eclipse- Scratch to Information security, with a unique ID certification without exam!!!
Jason Toy's insight:

If you are in IT security and really do not have a foothold in a computer language that you are comfortable with then at least check this out. Python really can, if done correctly, give you skills to seperate you from the herd. Well worth exploring.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

PenTest & Hacking Tools: Python tools for Pentesters

PenTest & Hacking Tools: Python tools for Pentesters | Push's Thoughts | Scoop.it
PenTest & Hacking Tools: Python tools for Pentesters http://t.co/w1kvOprbY9 #InfoSec
Jason Toy's insight:

Great article, a little on the  light side in terms of substance, but the  message is spot on. Do not rely on automation for Pen Testing / Hacking. This is not testing....this is nothing more complicated than  installing an exe and those going through the motions  know this. Learn the language, get involved, get in deep and really learn how it all works and the layers that are used that build and call on each other. This will increase your  knowledge, increase your skill level  (seriously knowing the basics of py puts you above  60%  of the testers out there in my opinion), and puts you on a road where you are not limited to what "modules" are available.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

A discussion with Lt. Col. William Hagestad II at our house, CentraComm

A discussion with Lt. Col. William Hagestad II at our house, CentraComm | Push's Thoughts | Scoop.it
I, along with a handful of brilliant engineers from CentraComm, have just recently had the opportunity and privilege to sit down to have an open chat with Lieutenant Colonel William Hagestad II at ...
more...
No comment yet.
Rescooped by Jason Toy from Digital-News on Scoop.it today
Scoop.it!

Splunk Applies Analytics Directly to Hadoop

Splunk Applies Analytics Directly to Hadoop | Push's Thoughts | Scoop.it
Splunk announces the release of its new Hunk: Splunk Analytics for Hadoop, a platform that allows users to iteratively explore Big Data.

Via Thomas Faltin
Jason Toy's insight:

This might be boring to some..but for us tech heads this is very cool indeed!

more...
No comment yet.
Rescooped by Jason Toy from Push's Thoughts
Scoop.it!

No password is safe from new breed of cracking software

No password is safe from new breed of cracking software | Push's Thoughts | Scoop.it

Over the weekend, the free password cracking and recovery tool oclHashcat-plus released a new version, 0.15, that can handle passwords up to 55 characters. It works by guessing a lot of common letter combinations. A lot. Really really fast.

Other long-string password-crackers exist, such as Hashcat and oclHashcat-lite, though they take a great deal more time to cycle through. This improvement runs at 8 million guesses per second while also allowing users to cut down the number of guesses required by shaping their attacks based on the password-construction protocol followed by a company or group.

A combination of increasing awareness of official scrutiny, such as the NSA leaks, growing instances of hacking of all kinds and leaked password lists, has inspired users to radically lengthen their passwords and use passphrases instead.

As Dan Goodin noted in Ars Technica, “Crackers have responded by expanding the dictionaries they maintain to include phrases and word combinations found in the Bible, common literature, and in online discussions.”


Via Amigo Omega, Jason Toy
Jason Toy's insight:
Jason Toy's insight:

Sadly most people use the same password for all of their accounts, I know it is more convenient but at what price? I know having all my accounts compromised at once would not be convenient for me!

more...
Jason Toy's curator insight, October 30, 2013 7:19 AM

Sadly most people use the same password for all of their accounts, I know it is more convenient but at what price? I know having all my accounts compromised at once would not be convenient for me!

Scooped by Jason Toy
Scoop.it!

Education needed to stop hackers exploiting web users’ oversharing data

Education needed to stop hackers exploiting web users’ oversharing data | Push's Thoughts | Scoop.it

More education needs to be provided and at a younger age in order to stop people oversharing data online, thus reducing the risk of hackers being able to exploit publically available information for cyber criminal gains.

That's what Darren Dance, Unix technical lead for online transaction firm WorldPay told Computing at Splunk Worldwide Users' Conference 2013 in Las Vegas.

 

 

Jason Toy's insight:

If the population as a whole could or would be smarter and educate themselves on how to act and intereact online it could limit some attacks. For the most part however, I have found that people just want to click next so they can play Candy Crush.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

Apple Overhauls Developer Site After Breach: Researcher Claims Credit

Apple Overhauls Developer Site After Breach: Researcher Claims Credit | Push's Thoughts | Scoop.it
Apple tells developers that an intruder attempted to take information from its software developer portal. But a researcher who claimed credit says he was merely reporting vulnerabilities.
Jason Toy's insight:

This was not just "seeking vulnerabilities" in my opinion.

more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA ... - Wired

Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA ... - Wired | Push's Thoughts | Scoop.it
Wired
Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA ...
more...
No comment yet.
Rescooped by Jason Toy from InfoSec Focus
Scoop.it!

Researcher claims responsibility for security breach at Apple Developer website - PCWorld

Researcher claims responsibility for security breach at Apple Developer website - PCWorld | Push's Thoughts | Scoop.it
Geek Researcher claims responsibility for security breach at Apple Developer website PCWorld An independent security researcher claimed responsibility for the security breach incident that forced Apple to close down its Developer Center website...

Via Susan Cook
more...
No comment yet.
Scooped by Jason Toy
Scoop.it!

Cybercrime can cost economy up to $500B | ZDNet

Cybercrime can cost economy up to $500B | ZDNet | Push's Thoughts | Scoop.it
Cybercrimes may cost the global economy US$100 billion to US$500 billion, and over 500,000 jobs in the U.S., due to various factors such as reputation damage, consumer losses, and service disruption costs.
Jason Toy's insight:

People need to think about this when deciding that a penetration test or vulnerability assessment are "unacceptable costs." NO..a breach is an unacceptable cost.

more...
No comment yet.