Dragon Research Group has compiled a list of the most popular usernames and passwords that are prevalent by SSH scanners/brute forcer attackers. It does not relate to popular account credentials such as the RockYou password research. Popular SSH Usernames Popular SSH Passwords
Continue ReadingEthical Hacker Network Challenge : Miracle on Thirty – Hack Street
The results for the Ethical Hacker Network Challenge – Miracle on Thirty Hack Street are finally in and I won a Technical Honorable Mention! The challenge was pretty good and was focussed on Facebook security or insecurity rather. Before I list my answers to the challenge, make sure to check out my blog post on […]
Continue ReadingMentoring the SANS 401 Security Essentials class
Definitely happy and excited that my mentor class is now live and I can begin the mentor program beginning September 21st in Cleveland. Personally, it is a wonderful opportunity for me to interact with other security professionals or those with interest in security. I am looking forward to helping interested folks leans the fundamentals of […]
Continue ReadingAnalyzing the 2010 Verizon Data Breach Report
In a way, the annual Verizon Data Breach reports have become a must read when it comes to analyzing the latest trends associated with data breaches. This years report had more meat and gained additional weight when the United States Secret Service (USSS) collaborated with the Verizon Business RISK team to create the report. Critical […]
Continue ReadingSQL Injection Attacks explained for the Developer
SQL injection attacks have become the most widely exploited security attacks on the Internet as they can usually bypass layers of security such as firewalls and any other network detection sensors. They are used most often to attack databases and for extracting any confidential information such as Social Security Numbers, Credit Card information etc. According […]
Continue Reading