Looking at the phishing email I received the other day telling me that my PayPal account had been suspended the next step in my investigation is to determine how it reached my inbox. There are many good resources available that describe manual email header analysis. To start out take a look at this article at […]
Summer Reading 101 – The Blue Team Field Manual
I read all the time. I admit that I read less now that I found and use Audible the Amazon audio book service). While Audible is great the books I chose to read (or re-read) this summer are probably not available there. I recently re-read the Blue Team Field Manual (BTFM) and read the Red […]
Using Biometrics to Replace Passwords
I was recently asked this question about biometrics replacing passwords… I’m working on a project right now where my team wants to substitute passwords and usernames for biometric authentication. I have expressed my multiple concerns for the security of such a system, but the idea has now come up that we could use a system […]
Understanding the Traffic Light Protocol (TLP)
The Traffic Light Protocol (TLP) takes something that most people know and applies it to a new problem. In this case the simple concept of roadway traffic lights applied to information sharing. As defined by FIRST, an organization formed by cyber first responders; the Traffic Light Protocol is “a set of designations used to […]
Getting Virtually Started
OK. Once you’ve downloaded Ubuntu the next decision will be where to install it. My suggestion is go virtual. In the past I ran Linux on my work laptop and on my personal iMac; both using VMware Fusion. As of this writing I am running v8.5 and the current version for Mac is v10. The […]