Quantcast
Channel: Reclamere Blog » Kirk Durbin
Browsing all 14 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

The Most Vulnerable Part of a Network is…

What do HBGary, RSA, and Apple have in common? They were all victims of a social-engineering attack. There is a common saying in the InfoSec community that the most vulnerable portion of a network is...

View Article



Should I Stay or Should I Go? The GoDaddy Outage

On September 10, around 10:30am, GoDaddy reported via their Twitter account that they were experiencing connectivity issues and were investigating the cause of the problem. Four hours later, it was...

View Article

Mandiant Reports Recent Data Hacks

This week, Mandiant, a Virginia-based cybersecurity firm released an extensive report accusing a Chinese military unit of hundreds of attacks on American businesses in search of intellectual property....

View Article

Hacker Group Compromises Major Corporation

A hacker compromises a major corporation and hides in the shadows for months, silently reading e-mails and monitoring traffic. The hackers notify the company and make demands. The FBI infiltrates the...

View Article

Image may be NSFW.
Clik here to view.

How Much Personal Information Are You Giving Up?

As a professional in the data security field, naturally I am a privacy-conscious person.  And since I do not believe in Government surveillance and cameras on every street corner, I do take extra steps...

View Article


OWASP Top 10 Web Application Vulnerabilities – 2013 Edition

I was listening to a podcast a few weeks ago, and the host mentioned that he had been reviewing the show when he realized he had accidentally been listening to an episode that was over a year old. The...

View Article

Staying Hidden in Cyberspace

This time last year, I was reading an article in Wired magazine about the new NSA data center being built in Utah and wondering what a yottabyte is (it is over 1 trillion Terabyte). I, along with other...

View Article

Image may be NSFW.
Clik here to view.

Be Cautious When Using Your Phone as a Wi-Fi Hotspot

I’m sure that just about everybody has seen or read an article by now that explains why open Wi-Fi Networks are dangerous. Well, due to a recently disclosed vulnerability, using your phone as a hotspot...

View Article


Image may be NSFW.
Clik here to view.

Protecting Against Cloud-Based Vulnerabilities

As more and more applications move to the cloud, more and more responsibilities are shifted from the internal organization network administrators to cloud-service providers. Organizations can rely on...

View Article


MID-ATLANTIC FCU IT AND SECURITY CONFERENCE

Last week, I had the opportunity to attend the IT and Security Conference hosted by the Mid-Atlantic Federal Credit Union. Being a self-proclaimed internet aficionado and knowing the caliber of the...

View Article

Reclamere’s Weekly Security Update: Episode 3- Social Engineering

Social Engineering is one of the easiest, effective ways for an attacker to infiltrate an organization. Do you think your organization is prepared to combat against an attack where patches, upgrades,...

View Article

Reclamere In The Media

Last week, Blair County was hit with two terroristic threats; one was a bomb scare at the Blair County Courthouse and the second was tampering with the water supply. Below, Reclamere’s CEO Angie Singer...

View Article

RECLAMERE’S WEEKLY SECURITY UPDATE: EP 5 – OCR AUDIT CRITERIA

HIPAA Compliance Guidelines have quickly become the standard rule-set for organizations dealing with any type of healthcare information. However, with the importance of HIPAA compliance, complexity of...

View Article


Reclamere’s Weekly Security Update: EP 7- Cryptolocker

A new ransomware virus dubbed ‘Cryptolocker’ is terrorizing the Internet and rampantly infecting thousands of people. This week on the Reclamere Weekly Security Update, Security Engineer Kirk Durbin...

View Article
Browsing all 14 articles
Browse latest View live




Latest Images