Friday, November 27, 2015

Updates coming soon!

Very sorry I have neglected this blog but I have been busy with about 9 million other things.  I plan on massive updates over the next two weeks so please check back.

R

Friday, June 26, 2015

A Basic Guide to Advanced Incident Response

https://sroberts.github.io/2014/05/07/a-basic-guide-to-advanced-incident-response/?utm_content=bufferc3f41&utm_medium=social&utm_source=linkedin.com&utm_campaign=buffer

Hijacked medical devices can leave networks exposed

http://www.csoonline.com/article/2936329/data-protection/hijacked-medical-devices-can-leave-networks-exposed.html#tk.lin_cso

Finding Hacking Services and More in the Deep Web

http://darkmatters.norsecorp.com/2015/06/16/finding-hacking-services-and-more-in-the-deep-web/

8 Vulnerable Software Applications

http://www.slideshare.net/heimdalsecurity/8-vulnerable-software-apps-exposing-your-computer-to-cyber-attacks-part-2?qid=2aa23b71-e447-48c8-b46b-a7152d0c4b55&v=qf1&b=&from_search=34

3 Alternatives to Skype Surveillance with End-to-End Encrypted Calls

http://cointelegraph.com/news/114614/3-alternatives-to-skype-surveillance-with-end-to-end-encrypted-calls

Real vs. fake tweets: Can you really trust that message for emergency communications?

http://venturebeat.com/2015/06/20/real-vs-fake-tweets-can-you-really-trust-that-message-for-emergency-communications/