Welcome to our

Cyber Security News Aggregator

.

Cyber Tzar

provide a

cyber security risk management

platform; including automated penetration tests and risk assesments culminating in a "cyber risk score" out of 1,000, just like a credit score.
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 16

Source: Roger's Information Security Blog

Articles recieved 31/12/2022
Article: Kanye’s Password - published over 5 years ago.
Content: Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password.   Its 00000. Not everyone is in on the joke. Some express OUTRAGE.  “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead.  He knew...
https://www.infosecblog.org/2018/10/kanyes-password/ 
🔥🔥
 
Published: 2018 10 12 22:48:44
Received: 2022 12 31 19:40:06
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Its the most wonderful time of the year – Patching - published over 5 years ago.
Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern.  The kids were out of college and ready to try out their skills.  Christmas was worse because so many people were out of the office, no one would notice.  Or if they did the response would be limited.   Now that’s what we call Tuesday af...
https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/ 
🔥🔥
 
Published: 2018 12 19 23:46:33
Received: 2022 12 31 19:40:06
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: log4jmemes.com - published over 2 years ago.
Content: https://log4jmemes.com/ made me laugh, so I made my own meme. not particularly clever, probably many others have used the same template. But hadn’t seen any at the time i made this one. The post log4jmemes.com appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2021/12/log4jmemes-com/ 
🔥🔥
 
Published: 2021 12 16 04:09:46
Received: 2022 12 31 19:40:05
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
19:40 Kanye’s Password
🔥🔥
19:40 Its the most wonderful time of the year – Patching
🔥🔥
19:40 log4jmemes.com
🔥🔥
Articles recieved 06/11/2022
Article: Link – What happens when you reply to spam email (Veitch) - published over 5 years ago.
Content: There are people who enjoy messing with scammers by replying to scam, or implementing the Jolly Roger Telephone company. While its a few years old, I just watched a couple of James Veitch Ted Talks on what happens when you reply to spam email. Its hilarious. Watch this video on YouTube. The post Link – What happens when you reply to spam email (Veitch) appe...
https://www.infosecblog.org/2018/08/link-what-happens-when-you-reply-to-spam-email-veitch/ 
🔥🔥
 
Published: 2018 08 15 11:56:45
Received: 2022 11 06 01:20:57
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: CISSPs from Around the World - published over 3 years ago.
Content: ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2020/11/cissps-from-around-the-world/ 
🔥🔥
 
Published: 2020 11 10 00:08:07
Received: 2022 11 06 01:20:54
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
01:20 Link – What happens when you reply to spam email (Veitch)
🔥🔥
01:20 CISSPs from Around the World
🔥🔥
Articles recieved 16/12/2021
Article: log4jmemes.com - published over 2 years ago.
Content: https://log4jmemes.com/ made me laugh, so I made my own meme. not particularly clever, probably many others have used the same template. But hadn’t seen any at the time i made this one. The post log4jmemes.com appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2021/12/log4jmemes-com/ 
🔥🔥
 
Published: 2021 12 16 04:09:46
Received: 2021 12 16 08:04:58
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
08:04 log4jmemes.com
🔥🔥
Articles recieved 06/06/2021
Article: Testing - published almost 6 years ago.
Content: Watch this video on YouTube. The post Testing appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2018/06/testing/ 
🔥🔥
 
Published: 2018 06 23 16:27:33
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Tuning up my WordPress Install - published almost 6 years ago.
Content: Dreamhost was sending me cryptic emails about my site using too many resources then dieing as a result. Then Jetpack site monitoring was finding the site down, presumably due to running out of resources. And the homepage loaded too slowly. So a technical problem was at hand. There aren’t a lot of resources out there for troubleshooting this sort of issue. ...
https://www.infosecblog.org/2018/06/tuning-up-my-wordpress-install/ 
🔥🔥
 
Published: 2018 06 24 01:22:12
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Link – What happens when you reply to spam email (Veitch) - published over 5 years ago.
Content: There are people who enjoy messing with scammers by replying to scam, or implementing the Jolly Roger Telephone company. While its a few years old, I just watched a couple of James Veitch Ted Talks on what happens when you reply to spam email. Its hilarious. Watch this video on YouTube. The post Link – What happens when you reply to spam email (Veitch) appea...
https://www.infosecblog.org/2018/08/link-what-happens-when-you-reply-to-spam-email-veitch/ 
🔥🔥
 
Published: 2018 08 15 11:56:45
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Airplay Annoyance - published over 5 years ago.
Content: I’ve never used Apple Airplay before.   I have an AppleTV that was free for paying  for a 3 month subscription with DirecTV Now.  But I hadn’t intentionally fired it up since cancelling that subscription. This week I bought a new TV.   While watching The Dark Knight on Netflix, suddenly the TV changes inputs to the AppleTV and Katherines Ipad is requesting t...
https://www.infosecblog.org/2018/08/airplay-annoyance/ 
🔥🔥
 
Published: 2018 08 18 03:22:57
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Kanye’s Password - published over 5 years ago.
Content: Everyone and his brother, inside of infosec and outside has been chortling at Kanye’s iPhone password.   Its 00000. Not everyone is in on the joke. Some express OUTRAGE.  “how dare you share that man’s password” (it was on CNN, its out there now). Some (and these remind me of the 4D Chess MAGA people) theorize that Kanye is thinking 12 steps ahead.  He knew...
https://www.infosecblog.org/2018/10/kanyes-password/ 
🔥🔥
 
Published: 2018 10 12 22:48:44
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Its the most wonderful time of the year – Patching - published over 5 years ago.
Content: does that say patching plaster or patch faster? Remember back when Summer and Christmas break was a high time of concern.  The kids were out of college and ready to try out their skills.  Christmas was worse because so many people were out of the office, no one would notice.  Or if they did the response would be limited.   Now that’s what we call Tuesday af...
https://www.infosecblog.org/2018/12/its-the-most-wonderful-time-of-the-year-patching/ 
🔥🔥
 
Published: 2018 12 19 23:46:33
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Secure File Deletion - published about 5 years ago.
Content: Today I received an email inviting me to buy a Easy File Shredder product for a special price of $15 instead of the usual price of $50. Securely deleting sensitive data is really important. But is buying a product really needed? This type of thing has generally been needed because when you delete a file, you are essentially marking the file space as...
https://www.infosecblog.org/2019/02/secure-file-deletion/ 
🔥🔥
 
Published: 2019 02 23 19:12:08
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: Beginner’s Mind - published almost 5 years ago.
Content: Shoshin is a word from Zen Buddhism meaning “beginner’s mind.” It refers to having an attitude of openness, eagerness, and a lack of preconceptions when studying a subject, even when studying at an advanced level. As IT people we aren’t always known for our attitude of openness, eagerness and lack of preconceptions. Its an easy field to get burnt out. ...
https://www.infosecblog.org/2019/05/beginners-mind/ 
🔥🔥
 
Published: 2019 05 28 13:53:39
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: CISSPs from Around the World - published over 3 years ago.
Content: ISC2’s blog has an feature where they interview CISSPs from around the world, and I see this month they interview Javvad Malik. Its a nice interview, but nothing compared to his original piece on the benefits of being a CISSP. Watch this video on YouTube. The post CISSPs from Around the World appeared first on Roger's Information Security Blog. ...
https://www.infosecblog.org/2020/11/cissps-from-around-the-world/ 
🔥🔥
 
Published: 2020 11 10 00:08:07
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
Article: CloudFlare Gateway DNS Filtering - published over 3 years ago.
Content: With some downtime over the holidays, I was checking in to see if my ISP has added IPv6 support yet. But sadly nothing had changed in months. So just for fun, I reset up a 6 in 4 tunnel to Hurricane Electric from my router. Sending traffic in a tunnel to HE rather than directly to its destination isn’t exactly going to speed things up. I’ve also he...
https://www.infosecblog.org/2020/12/cloudflare-gateway-dns-filtering/ 
🔥🔥
 
Published: 2020 12 28 03:57:45
Received: 2021 06 06 09:04:46
Feed: Roger's Information Security Blog
Source: Roger's Information Security Blog
Category: Cyber Security
Topic: Cyber Security
09:04 Testing
🔥🔥
09:04 Tuning up my WordPress Install
🔥🔥
09:04 Link – What happens when you reply to spam email (Veitch)
🔥🔥
09:04 Airplay Annoyance
🔥🔥
09:04 Kanye’s Password
🔥🔥
09:04 Its the most wonderful time of the year – Patching
🔥🔥
09:04 Secure File Deletion
🔥🔥
09:04 Beginner’s Mind
🔥🔥
09:04 CISSPs from Around the World
🔥🔥
09:04 CloudFlare Gateway DNS Filtering
🔥🔥
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Navigation
Return to Planet "Home"
Ordered/grouped:
Filter applied:
Current page:
Go to "Navigation Help" (page end)
Articles in this collection: 16
  • "Home" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Authors is the most poorly serviced field in the articles we see from cyber security news providers.
  • Only Published Date selections use the articles Published Date (for ordering and grouping).
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • Return to the top of this page "Go Now"

Custom HTML Block

Click to Open Code Editor