Kali Linux Not Updating

Open a terminal and run the below commands to quickly fix the issue: Type sudo -i Type in your password. Type touch /etc/apt/sources.list Type chmod 644 /etc/apt/sources.list Type echo “deb http://http.kali.org/kali kali-rolling main contrib non-free” > /etc/apt/sources.list Type ‘apt-key adv –keyserver hkp://keys.gnupg.net –recv-keys 7D8D0BF6’ Type apt-get update Now install whatever it is that you want

Read more 

Protecting Against Social Engineering and Phishing Attacks

What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An attacker may seem unassuming and respectable, possibly claiming to be a new employee, repair person, or researcher and even offering credentials to support that

Read more 

Microsoft Privilege Escalation Vulnerability

Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface, which can allow a local user to obtain SYSTEM privileges. As many of you have seen there is a zero-day, privilege escalation, exploit for nearly all current versions of windows. https://www.kb.cert.org/vuls/id/906424 We haven’t seen any reasonable mitigating

Read more 

Microsoft Surface Pro 4

Powered by Windows 10, Surface Pro 4 turns from a tablet into a full powered laptop while running all of your desktop software. 12.3’’ PixelSense™ display has high contrast and low glare, giving you a picture rivaling real life. Multi-position kickstand and improved Type Cover transforms into a fully functioning laptop running desktop software. Surface

Read more 

Understanding NERC

What is the North American Electric Reliability Corporation (NERC)? The North American Electric Reliability Corporation (NERC; www.nerc.com) is a not-for-profit organization with a mission to “ensure the reliability of the North American bulk power system.” It encompasses the interconnected SCADA power grids of the United States, Canada, and a portion of Baja California, Mexico. Following

Read more 

Understanding FISMA

What is the Federal Information Security Management Act (FISMA)? The Federal Information Security Management Act of 2002 (FISMA) assigns certain responsibilities to U.S. government agencies to ensure the confidentiality, integrity, and availability of federal government data. The act requires program officials to conduct annual reviews of information security programs. However, as of September 2012, the

Read more 

Understanding the Health Insurance Portability and Accountability Act (HIPAA)

What is the Health Insurance Portability and Accountability Act (HIPAA)? The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is maintained by the U.S. Department of Health & Human Services (www.hhs.gov). Designed to protect the confidentiality and integrity of patient health information (PHI), HIPAA had only a muted effect on the security industry until

Read more 

How to create a strong password

Creating Strong Passwords It’s easier than you think to create strong, hard-to-guess, easy-to-remember passwords. Strong passwords will help you keep you and your companies data safe. Below are some good tips for creating strong passwords: Use a password phrase and make it relevant to the account Make it at least 10 characters Make it something

Read more