412-515-3010

Blog

This page is dedicated to the security conversations which we encounter on a daily basis.

Security Hacking Stories

Search

Flash back to 2014 - Chineese Hackers hit Pittsburgh Businesses
By Admin - 5/15/2017 Flash back to 2014 - Chineese Hackers hit Pittsburgh Businesses Chinese Hackers from the Chinese Blue Army hit the Global Corporation Centers of Industry in Pittsburgh, PA.

Software Vulnerability Taxonomy
By Admin - 12/2/2016 Software Vulnerability Taxonomy Bugs, Vulnerabilities, Defects, and other names? What's in a name? If the name maters to you there are many ways for us to classify the name, but in the end, helping the developer fix the problem is the real issue.

PCNC - Night Talk with Ellis Cannon
By Admin - 9/6/2016 PCNC - Night Talk with Ellis Cannon Ellis Cannon Host of NightTalk - @EllisCannon - Aug 30 At 8:00 @SalenaZito talking Hillary emails, Trump immigration, FBI notes on Hillary & @AWhalePgh on if election cd be hacked @PCNCnighttalk ! Not to mention that Dogs understand English (or do they?)!

Vendor generated STIGs Help DISA Accelerate New Technology Adoption
By Admin - 9/6/2016 Vendor generated STIGs Help DISA Accelerate New Technology Adoption New technologies are introduced all the time, and every product vendor touts the advantages of its new products. But ensuring it’s safe to connect those new systems to secure military networks can be a dicey proposition. That’s why the Defense Information Systems Agency issues STIGS – Security Technical Implementation Guides – for high-demand information technology products.

PCNC - Night Talk with Ellis Cannon Interview, July 6th, 2016
By Admin - 7/11/2016 PCNC - Night Talk with Ellis Cannon Interview, July 6th, 2016 The PCNC show called Night Talk with Ellis Cannon is a great show which discusses current events information, and always has interesting Guests on the show to have conversations with. Our President, Albert Whale, was on the July 6th show to discuss a variety of topics.

Never 10
By AlbertWhale - 3/30/2016 Never 10 Never 10 is an easy to use utility which gives users control over whether their Windows 7 or 8.1 will upgrade itself to Windows 10. I don't always adopt a software package, but in this case, I'm making an exception, so that I can protect my Security.

Evolving Malware Means Evolving Security
By Admin - 11/5/2015 Evolving Malware Means Evolving Security Some people are having a hard time understanding that Security is a Mandate, and they either need to step up, or become irrelevant. Malware has taken a turn to become a more virulent opponent. Is your environment prepared?

Perfect Security in three easy steps.
By Admin - 11/3/2015 Perfect Security in three easy steps. Some of my clients believe that the firewalls and Virus scanners they own are all that is really needed to keep them safe and protected. Here's a look at one reality that I help all of my clients avoid. Reposted with permission by Peter Herzog.

There's No Free Lunch for Security
By Admin - 10/4/2015 There's No Free Lunch for Security There is no FREE Lunch when it comes to Cyber Security. Many organizations believe that they can ignore the implementation of security in their organization, at least until they have been hacked. By the time that this occurs however, it's too late. Unfortunately by that time, they cannot get the information back.

Compliance is not Security.
By Admin - 9/25/2015 Compliance is not Security. This Summer (July 2015), it was announced that yet another United States Government agency was hit with a security breach.  The Federal Census Bureau released that the breach did have data related to census and surveys done by the fed, although no personal information of those surveyed was infiltrated by hackers.

Is Free Wifi something that you use?
By Admin - 9/15/2015 Is Free Wifi something that you use? Every day, tens of millions go to their nearest public Wi-Fi hotspots: cafes, restaurants, hotels, libraries, you name it.  Many places make it easy to access quickly.  But what rights are you losing as you log into one of these internet providers?

Unplugging did not stop them.
By Admin - 7/27/2015 Unplugging did not stop them. Has the PlayStation network been breached again?

Hacking scandal not about cheating
By Admin - 7/10/2015 Hacking scandal not about cheating St. Louis Cardinals manager Mike Matheny talks with the media before a game against the Minnesota Twins on Tuesday in St. Louis. Federal law enforcement authorities are investigating whether the Cardinals hacked into a computer database of the Astros to obtain information on players.

The Obama Administration Introducing Legislation for Breach Notification
By AlbertWhale - 1/18/2015 The Obama Administration Introducing Legislation for Breach Notification President Obama is proposing a national data breach notification law that would require businesses to notify consumers within 30 days of a breach. The Personal Data Notification and Protection Act, if enacted, would supersede nearly four dozen state statutes that regulate data breach notification. The bill is one of a series of measures Obama proposed in a speech delivered Jan. 12 at the Federal Trade Commission. He contends the proposal is aimed at protecting American companies, consumers and infrastructure from cyberthreats while safeguarding privacy and civil liberties.

The 10 Worst Security Incidents Of 2014 Breaches (plus one)
By Admin - 1/9/2015 The 10 Worst Security Incidents Of 2014 Breaches  (plus one) It is difficult to pick only 10 Security Incidents in 2014, that is why we have added an additional entry to the top ten list, the Sony Breach for the Interview.

Subscribe me to the Mailing List

Subscribe to our Mailing List

Name *
Phone Number
Your Email *
Subject