Emotet technical/behavior overview

This is a great article covering the basics of the Emotet malware that has been active in recent months. While not a hard-core drilldown into code, it gives anyone the ability to watch for certain…

2019: Healthcare breaches so far

Come on guys, we’re a month in to 2019. Is this a “more eyeballs” problem? This article suggests greater training. I agree. But it can’t be those boring seminars. It has to stick. “Create or…

SAP opens up about open source

It’s nice to see another large company becoming more public and accepting of open source solutions. In this case, it’s the German company SAP specializing in enterprise business software: “SAP prefers not to be a…

CCDC 2018 Prep

This blog will be turning into a repository for research into the Collegiate Cyber Defense Competition for the next few months until the Minnesota state competition in February 2018. Fun?  Oh you know it.

30 JAN 2017 infiniteLinks

Hello and welcome!  Today we have a good mix of security-related links, from Android to Disaster Recovery to Linux and some Scams.  Enjoy! Android How a single SMS can break your Samsung Galaxy Android phone…

Assembly Adventure (1)

Lately I’ve been attempting to achieve a deeper understanding of lower-level machine functions in my quest to gain a greater knowledge of computer security issues.  Things like reverse engineering, shellcode, C and malware functions are…

26 JAN 2017 infinite links

Today I gathered a few good links on Linux distros for new users, some new ones that are getting popular, and some ways to secure your Linux machine.  Enjoy! Linux Best Linux Distributions for New…

25 JAN 2017 InfiniteLinks!

Today’s link list focuses on recent Android security issues, a data breach report, and some painful realizations from TrendMicro. Android –Security Analysts Identify a Trojan that Quietly Purchase Apps, a Rootkit that takes over your…