LuciusonSecurity is privileged to be chosen as one of the Top 100 Information Security Blogs for Data Security Professionals in 2017 by feedspot.com.
Disgruntled Driver asks Share Ride Cab Company OLA to Pay Ransom for Kidnapped Passenger
A doctor called a shared ride cab to drive him to the private hospital
where he worked. The shared ride arrived on time, but instead of taking the
doctor to his destination, the driver threatened the doctor and kidnapped
him. The OLA cab driver,…
Four Easy Ways that make Cybercrooks Billions ! With money you hand them!!!!
Lucius on Security Lucius on Security http://luciusonsecurity.blogspot.com/ CySecBot CySecBot
Twelve Commandments that will never fail to Keep You Cyber Safe Online
As the digital
world explodes with a variety of new online services, cyber threats have become more
ingenuous, dangerous, and spawned multiple variants and types. As
each new threat makes the headline, the accompanying set of threat specific security
…
What’s The Lifespan Of A Video Surveillance System?
Homeowners are increasingly realizing the benefits of installing a residential video surveillance system. However, the biggest concern for consumers adopting new technology-based products, such as home security systems, is how long the device can serve them before it becomes outdated. Consumers expect that their new surveillance systems featuring the latest technologies will remain relevant and … Continue reading What’s The Lifespan Of A Video Surveillance System?
The post What’s The Lifespan Of A Video Surveillance System? appeared first on Calgary Alarm Inc..
How To Theft-Proof Your Personal Belongings While Travelling
Compared to a decade ago, when all you needed to take care of when travelling were a passport and ATM card, and perhaps a disposable camera, today you stand to lose a lot more if you don’t take active measures to secure your personal belongings. You need to take care of your portable laptop, smartphone … Continue reading How To Theft-Proof Your Personal Belongings While Travelling
The post How To Theft-Proof Your Personal Belongings While Travelling appeared first on Calgary Alarm Inc..
Toolsmith #126: Adversary hunting with SOF-ELK
As we celebrate Independence Day, I’m reminded that we honor what was, of course, an armed conflict. Today’s realities, when we think about conflict, are quite different than the days of lining troops up across the field from each other, loading musk…
3 Common Home Break-In Methods Used By Burglars
Crime can affect anyone. It is unfortunate when crime affects you directly or indirectly—either as a victim, or as a person who’s afraid of becoming a victim—both of which reduce your enjoyment of life. Although many homeowners assume that burglars are “master criminals” who are highly organized and have access to specialised tools to get … Continue reading 3 Common Home Break-In Methods Used By Burglars
The post 3 Common Home Break-In Methods Used By Burglars appeared first on Calgary Alarm Inc..
Attacking SSH with Metasploit and Medusa.
What is SSH??? SSH, also known as Secure Socket Shell, is a network protocol that provides administrators with a secure way to access a remote computer.The best known example application is for remote login to computer systems by users. Here with the help of Metasploit and Medusa,I tried to get the Password of SSH. … Continue reading Attacking SSH with Metasploit and Medusa.
Defeating pass-the-hash attacks with two-factor authentication
Implementing two-factor authentication for remote access is a great way to keep attackers out of your network. Users’ credentials are floating all around the internet. But attackers can still get in your network through malware and other tools. In t…