Find an Expert
Security Marketing and PR
Education and Training
Mobile App Security
CIO / CTO / CSO / CISO / Virtual CISO
Welcome! Create a free account.
I want to hire
Post a description. Connect with top security and IT experts.
Sign up as a business
I'm an expert
Find opportunities with great companies. Network with our community.
Sign up as an expert
Have an account? Login here.
Information Architect, Consultant
Posts by padron71
Thousands of Trucks, Buses, and Ambulances May Be Open to Hackers via Telematic Gateway Units
"Telematics gateway units” are devices attached to industrial vehicles’ networks that track location
JOSE CARLOS NORTE
TELEMATICS GATEWAY UNIT
Now We Know — Apple Can Unlock iPhones, Here's How to Hack-Proof your Device
Simply set at least random 11-digit numeric passcode for your iPhone
Fraudsters Tap Kohl’s Cash for Cold Cash
Hacked accounts from retailer Kohl’s.com order bulky products and receive gift card credits
Top Reasons to Pay Attention to the Dark Web
Proactive Approach that Helps Reduce Uncertainty and Improves Overall Cyber Resiliency
Hot Potato Exploit Gives Attackers the Upper Hand On Multiple Windows Versions
A way to break into almost all of Microsoft's recent versions of Windows by using 3 attacks
OpenSSH Patches Serious Information Disclosure Flaw (CVE-2016-0777)
Memory disclosure flaw that allows a rogue SSH server to trick a client into leaking sensitive data
Drupal Starts Patching Update Process Flaws
Drupal 7 and 8 erroneously inform users that their installation is up to date if a failure occurs
Encrypted Messaging Apps Face New Scrutiny Over Possible Role in Paris Attacks
Isis has used a range of encryption technologies that defy cracking by the NSA
Microsoft Considers Earlier SHA-1 Deprecation Deadline
Microsoft may start blocking SHA-1-signed TLS certs in June 2016
Hack The Galaxy: Hunting Bugs in the Samsung Galaxy S6 Edge (CVE-2015-7888)
11 high-impact security issues found on Samsung Galaxy S6 Edge by Project Zero
Unpatched Mac OS X Zero-day Bug Allows Root Access Without Password
Hack Allows Mac OS X Root Access, exploits DYLD_PRINT_TO_FILE
Android Backup restoration allows for injection of malicious apps
innocent-looking Android app can install new apps with extra permissions without the user's consent
Hacking Team data theft culprit exposed - Phineas Fisher
Hacker has come forward to take responsibility for the explosive Hacking Team data breach
Slack: March 2015 Security Incident and launch of Two Factor Authentication
Slack. the high flying Internet chat service, suffered a data breach in March 2015
TWO FACTOR AUTHENTICATION
Attackers Target Community Banks
Why Smaller Institutions Face Greater Threats Than Big Banks
Facebook Issues Present Possible Threat to Users - Reflected File Download Flaw
Two new Facebook security flaws revealed, one of may compromise victim's machine
How Behavioral Analytics Can Protect Businesses From Data Theft
Examples of when behavioral analytics may be the right tool to fight data theft.
Why Firmware Is So Vulnerable to Hacking, and What Can Be Done About It
Computers contain lots of firmware- from USB keyboards, web cams, graphics & sound cards, batteries
phpMoAdmin Zero-day Vulnerability Puts Websites Using MongoDB at Risk
phpMoAdmin is vulnerable to a Zero-Day Remote Code Execution flaw - exploit for sale that works
ZERO DAY EXPLOIT
9 common security awareness mistakes (and how to fix them)
Human factors are a greater risk to organizations than flaws in technology
As Flash 0day exploits reach new level of meanness, what are users to do?
2015 is shaping up as one of the most perilous years for users - with Flash main culprit.
Year of the Digital Threat: The Four Biggest Cyber Security Incidents of 2014
A reminder of 4 prominent attacks to keep you on your toes
Got a Data Breach? Call a Cyber Lawyer First
Unlike lay advisors, attorneys bring with them attorney-client privilege and work product protection
Fatal Flaws of Obama's Cybersecurity Plan
Proposed legislation is well meaning but likely to be ineffective
Generation Z Predicts End to Passwords and PINs by 2020
Passwords to be replaced by Biometrics, according to Visa Europe
What is a Doxing Attack? Think Sony.
Not currently following any packages.
padron71 has not filled out any achievements
Where should we email
free access to your Security Grader?
We don't share emails
access to my Security Grader