• Information Security

    Risk Management, Forensics investigations - Certified Ethical Hacker.

  • Web Development

    Joomla, Wordpress, Bootstrap, Responsive design, etc.

    My responsive designs are optimal for mobile viewing

  • Consulting

    Risk & Vulnerability Assessments, Employee training, framework implementation, Disaster Rovery, and more

    My responsive designs are optimal for mobile viewing

Main Menu.1

Stay Connected

Join my mailing list and stay informed of all the lasted news and blog posts!

Get Social

Browser Autofill Profiles Can Be Abused for Phishing Attacks

Browser autofill profiles are a reliable phishing vector that allow attackers to collect information from users via hidden or invisible fields, which the browser automatically fills with preset personal information and which the user unknowingly sends to the attacker when he submits a form. Autofill profiles are a recent addition to modern-day browsers. This feature works by allowing the user to create a profile that holds different details about himself that he usually enters inside web forms.

Read More
11 0 Add

Democracy Compromised - Foreign Influence of the 2016 Presidential Election

The 2016 U.S. Presidential Election was unprecedented on a number of levels. One’s political inclinations aside, it is clear that there was a concerted foreign effort undertaken to influence the decision-making calculus of the American electorate. Was the perpetrator of that effort Russia, as conventional wisdom holds?

Read More
10 0 Add

The Cerber Ransomware not only Encrypts Your Data But Also Speaks to You

A ransomware called Cerber has been floating around for about a week, but we were not able to retrieve a sample until today. Thanks to @BiebsMalwareGuy and @MeegulWorth, samples were found and further analysis of the ransomware could be done.  When infected, a victim's data files will be encrypted using AES encryption and will be told they need to pay a ransom of 1.24 bitcoins or ~500 USD to get their files back. Unfortunately, at this point there is no known way to decrypt a victim's encrypted files for free. At this time we do not currently know how the Cerber ransomware is being distributed, but according to SenseCy, it is being offered as a service on a closed underground Russian forum. This means that it is probably a new Ransomware as a Service, or RaaS, where affiliates can join in order to distribute the ransomware, while the Cerber developers earn a commission from each ransom payment. For anyone who is infected with this ransomware or wants to discuss the infection, you can find a dedicated support topic here: CERBER Ransomware Support and Help Topic.

Read More
511 0 Add

Welcome to My New Site

After months of trying to find the right design, I think I finally came up with the perfect one.  Leave a comment below to let me know what you think of my new digs!  

Read More
396 0 Add

U.S. Cyber Command struggles to retain top cybersecurity talent

Top official in Defense Department's cybersecurity unit says organization is doing an ‘effective jo...

Read More
355 0 Add

FFIEC Issues Statement on Safeguarding the Cybersecurity of Interbank Messaging and Payment Networks

The Federal Financial Institutions Examination Council (FFIEC) members today advised financial institutio...

Read More
3672 0 Add

Netflix Resets Passwords Following LinkedIn, Myspace Breaches

Heads up for those who tend to reuse the same password across the Web: If you want to get back into your ...

Read More
378 0 Add

Fed Inspector General Plans Information Security Audit

The Federal Reserve’s Office of the Inspector General is planning an audit of the Fed’s infor...

Read More
622 0 Add

Dropbox Smeared in Week of Megabreaches

Last week, LifeLock and several other identity theft protection firms erroneously alerted their customers...

Read More
403 0 Add

A Trick For Creating Memorable Passwords

With the tips above, it’s pretty easy to come up with a password. Just bash your fingers against yo...

Read More
461 0 Add

Tumblr and MySpace passwords hit by “mega breach”

Hundreds of millions of hacked account details from social networks MySpace and Tumblr have been advertis...

Read More
337 0 Add

Emails raise more questions of Clinton infosec practices

A batch of recently released documents set off renewed discussions about Hillary Clinton's information se...

Read More
492 0 Add

Interesting Facts on Cybersecurity

The prevalence of cyber crime has skyrocketed over the past several years to include cyber espionage, mal...

Read More
352 0 Add

What is Social Engineering?

Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychol...

Read More
425 0 Add

You're Probably Using One of These Terrible Passwords.

The 25 most popular passwords on the internet include "123456," "password" and "passw0rd." Read on to see...

Read More
356 0 Add

What is Phishing?

Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or...

Read More
479 0 Add

Site Disclaimer


The content provided with this site is for article purposes only.
All images and content (C) the original authors.

Contact Me

Contact Me

I'm excited to hear from you!

You can contact me via my Contact Page. If you'd prefer to give me a ring you can always call me at:

My Address

9 10th Avenue Southeast Aberdeen, South Dakota, United States 57401

Get Social

Newsletter Subscribe