Penetration Testing

HALOCK INVESTIGATES: Network Chatter from China

 

Cybersecurity Chat

Network Chatter from China

Imagine one hundred container ships full of the most valuable U.S. assets heading to China every day. Diamonds, gold, oil, John Deere Tractors, priceless artwork, Chevy Corvettes, life-saving artificial hearts, books from our historic libraries, soybeans, the latest Intel® processors, Redwood trees, the genuine (more…)

8 Ways to Avoid Becoming a Human Hack

Avoid Becoming a Human Hack.

I’ve become a fan of the show Impractical Jokers. If you haven’t seen it, three friends play jokes on the fourth, and he has to repeat whatever line is fed to him. The goal is to successfully convince random strangers to say or do a certain thing that they would not normally do. At the beginning of every challenge (more…)

privacyrights.org

If you’ve never checked out http://www.privacyrights.org, I would encourage you to do so. It’s a listing of all breaches made public from 2005 up to present, presented in reverse chronological order. They collect the information from a variety of sources.
You can filter your search by checking/un-checking various boxes on (more…)

Verizon 2012 Data Breach Report

If you haven’t read the Verizon 2012 Data Breach Report, you may want to check it out.  Contains a wealth of information on what’s going on in information security breaches.  Here’s a link: (more…)

Go to Top