• Information Security

    Risk Management, Forensics investigations - Certified Ethical Hacker.

  • Web Development

    Joomla, Wordpress, Bootstrap, Responsive design, etc.

    My responsive designs are optimal for mobile viewing

  • Consulting

    Risk & Vulnerability Assessments, Employee training, framework implementation, Disaster Rovery, and more

    My responsive designs are optimal for mobile viewing

Main Menu.1

Stay Connected

Join my mailing list and stay informed of all the lasted news and blog posts!

Get Social

The Cerber Ransomware not only Encrypts Your Data But Also Speaks to You

A ransomware called Cerber has been floating around for about a week, but we were not able to retrieve a sample until today. Thanks to @BiebsMalwareGuy and @MeegulWorth, samples were found and further analysis of the ransomware could be done.  When infected, a victim's data files will be encrypted using AES encryption and will be told they need to pay a ransom of 1.24 bitcoins or ~500 USD to get their files back. Unfortunately, at this point there is no known way to decrypt a victim's encrypted files for free. At this time we do not currently know how the Cerber ransomware is being distributed, but according to SenseCy, it is being offered as a service on a closed underground Russian forum. This means that it is probably a new Ransomware as a Service, or RaaS, where affiliates can join in order to distribute the ransomware, while the Cerber developers earn a commission from each ransom payment. For anyone who is infected with this ransomware or wants to discuss the infection, you can find a dedicated support topic here: CERBER Ransomware Support and Help Topic.

Read More
455 0 Add

Welcome to My New Site

After months of trying to find the right design, I think I finally came up with the perfect one.  Leave a comment below to let me know what you think of my new digs!  

Read More
340 0 Add

Looking to volunteer a website design.

I am looking to assist a charity or nonprofit in a new design or redesign of their site.  The only costs will be domain registration and hosting, both of which can be found at various places like godaddy, namecheap, or bluehost.  I will provide the design from top to bottom at absolutely  no cost.

Read More
508 0 Add

Tech Support Scams

In a recent twist, scam artists are using the phone to try to break into your computer. They call, claiming to be computer techs associated with well-known companies like Microsoft. They say that they’ve detected viruses or other malware on your computer to trick you into giving them remote access or paying for software you don’t need. These scammers take advantage of your reasonable concerns about viruses and other threats. They know that computer users have heard time and again that it’s important to install security software. But the purpose behind their elaborate scheme isn’t to protect your computer; it’s to make money.

Read More
770 0 Add

U.S. Cyber Command struggles to retain top cybersecurity talent

Top official in Defense Department's cybersecurity unit says organization is doing an ‘effective jo...

Read More
306 0 Add

FFIEC Issues Statement on Safeguarding the Cybersecurity of Interbank Messaging and Payment Networks

The Federal Financial Institutions Examination Council (FFIEC) members today advised financial institutio...

Read More
3202 0 Add

Netflix Resets Passwords Following LinkedIn, Myspace Breaches

Heads up for those who tend to reuse the same password across the Web: If you want to get back into your ...

Read More
327 0 Add

Fed Inspector General Plans Information Security Audit

The Federal Reserve’s Office of the Inspector General is planning an audit of the Fed’s infor...

Read More
517 0 Add

Dropbox Smeared in Week of Megabreaches

Last week, LifeLock and several other identity theft protection firms erroneously alerted their customers...

Read More
352 0 Add

A Trick For Creating Memorable Passwords

With the tips above, it’s pretty easy to come up with a password. Just bash your fingers against yo...

Read More
354 0 Add

Tumblr and MySpace passwords hit by “mega breach”

Hundreds of millions of hacked account details from social networks MySpace and Tumblr have been advertis...

Read More
298 0 Add

Emails raise more questions of Clinton infosec practices

A batch of recently released documents set off renewed discussions about Hillary Clinton's information se...

Read More
420 0 Add

Interesting Facts on Cybersecurity

The prevalence of cyber crime has skyrocketed over the past several years to include cyber espionage, mal...

Read More
307 0 Add

What is Social Engineering?

Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychol...

Read More
371 0 Add

You're Probably Using One of These Terrible Passwords.

The 25 most popular passwords on the internet include "123456," "password" and "passw0rd." Read on to see...

Read More
307 0 Add

What is Phishing?

Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or...

Read More
383 0 Add

Site Disclaimer


The content provided with this site is for article purposes only.
All images and content (C) the original authors.

Contact Me

Contact Me

I'm excited to hear from you!

You can contact me via my Contact Page. If you'd prefer to give me a ring you can always call me at:

My Address

9 10th Avenue Southeast Aberdeen, South Dakota, United States 57401

Get Social

Newsletter Subscribe