DDoS Attack Preparation Workbook

Internet DDoS Attacks are a force of nature on the Internet. They are like earthquakes, hurricanes, floods, tornados, tsunamis, and all other disasters. Organizations need to prepare for a DDoS Attack the same way they prepare for severe weather and natural disasters. These guides have been crafted based on my personal experience (+25 years of

DDoS Extortionist’s Behaviors

Smart and prepared organizations use DDoS Extortionist’s Behaviors as a Defensive Tool. We have a long history of DDoS Extortionists. In the early 2000s, we had DDoS Extortionists who would threaten “gambling sites” with a DDoS Attack 30 minutes before a match. This crew was later tracked by law enforcement and arrested. DDoS Extortion has

Conficker Working Group – Archive of Materials

Conficker Still Survives! While public attention to Conficker has faded since the widely publicized April 1st, 2009 “attack date”, the fact is that a huge number of computer systems remain infected with Conficker. As recently as late October 2009, the number of systems infected with the A+B+C variants topped seven million. The Conficker Working Group

Expected DoS Attacks – 10 Steps to Prepare for the Pain

Version 1.0 It is time to prepare for Expected DoS Attacks. There is no perfect anti-DoS solution. But with forethought, planning, coordination, and practice any organization minimizes the impact of the DoS attacks. What follows ten essential steps that have proven to help organizations prepare for DoS attacks. The fundamental principles you will find in

Protect Your Network from an Internet Worm during COVID-19

Do you want a repeat of Wanacry? Do you want an Internet Impacting Worm in the middle of the COVID-19 Crisis? All organizations can take two steps to minimize the risk of a potential Internet worm. First, they can deploy an access-lists on the edge of their network that block TCP/UDP port 445. This can Read More

Get Started in the Security Industry

  Get started in the Security Industry, What are my first steps? If you are reading this, you are doing the right type of security digging. You are looking for ways to get started in the security industry. You have a desire to dive deep in the security world. Welcome to the world of chaos, Read More

Removing Malware from MACs

Steps by Step Guide to Removing Malware from MACs Removing Malware from MACs is a guide for anyone who has a MAC laptop or desktop. What steps can you take to remove Viruses, Bots, Malware, Unwanted Programs, Plug-ins and Other “unwanted” Software from your MAC OS. These steps also include the precautions for Ransomware.  (version

Breakthrough IOT Security to Secure Smart Cities

The Global Cyber Alliance (GCA) announced their latest IOT Security tool. Automated IoT Defence Ecosystem (AIDE) is a platform built for IOT vendors and researchers. IOT is powerful capability that will be developed by innovators all over the world. The 25 billion by 2021 is a drastic underestimate. The IOT security threat is also underestimated. Read More

What Stops a Nation-State BGP Hijack?

Can Nation-State BGP Hijack Parts of the Internet? Yes, a Nation-State BGP Hijack is a threat on the Internet. Nation-States can orchestrate the manipulation of the Border Gateway Protocol (BGP) via “hacked routers all over the world. These routers would then be used to inject bad, misconfigured, or non-authorized routes all over the world. The result Read More

Security Organizations

There are many Security Organizations in the world all working towards the goal of a more secure & resilient Internet. This is an ongoing list of known security organization. Security Groups 10 Years and Older Forum of Incident Response and Security Teams (FIRST) – FIRST is the Forum of Incident Response and Security Teams. The