September 2015 News and Updates

Monthly Newsletters, Uncategorized
   What's New Hacker Play Date v2.0 -  The first Hacker PlayDate (HPD) ended up being a much bigger success than we expected and, as a result, we will be hosting the second Hacker PlayDate (HPDv2.0) on 12 September 2015.  HPDv2.0 will be held in the meeting room at Primo's Mexican Cocina (next door to Cyber Tech Cafe) so we won't be quite as cramped.  The format will be similar but we plan to have some additional booths (tables) setup for things like the lock-picking, Raspberry Pi, etc. (the lock picking table seemed to be a big hit at HPDv1.0).   If you are interested or if you know someone else that would be interested in a demo (anything from lock picking to physical security to hacking a Raspberry Pi to setting…
Read More

August 2015 News and Updates

Monthly Newsletters, Uncategorized
   What's New Welcome BlitzComputing - We are excited to announce the recent acquisition of Blitz Computing and welcome the Blitz Computing family into the Cyber Tech Cafe family.  We've worked extensively with the leadership at Blitz Computing to make certain that the transition is transparent.  We look forward to working with you as your new tech support company! Hacker Play Date v2.0 -  The first Hacker PlayDate (HPD) ended up being a much bigger success than we expected and, as a result, we will be hosting the second Hacker PlayDate (HPDv2.0) on 12 September 2015.  HPDv2.0 will be held in the meeting room at Primo's Mexican Cocina (next door to Cyber Tech Cafe) so we won't be quite as cramped.  The format will be similar but we plan to have some…
Read More

July 2015 News and Updates

Monthly Newsletters, Uncategorized
   What's New Hacker Play Date v2.0 -  The first Hacker PlayDate (HPD) ended up being a much bigger success than we expected and, as a result, we will be hosting the second Hacker PlayDate (HPDv2.0) on 12 September 2015.  HPDv2.0 will be held in the meeting room at Primo's Mexican Cocina (next door to Cyber Tech Cafe) so we won't be quite as cramped.  The format will be similar but we plan to have some additional booths (tables) setup for things like the lock-picking, Raspberry Pi, etc. (the lock picking table seemed to be a big hit at HPDv1.0).   If you are interested or if you know someone else that would be interested in a demo (anything from lock picking to physical security to hacking a Raspberry Pi to setting…
Read More

June 2015 News and Updates

Monthly Newsletters, Uncategorized
What's New Hacker Play Date - Cyber Tech Cafe will be co-hosting a Hacker Play Date on Saturday, 20 June 2015 at 10:00am EDT.  We have it scheduled until 6:00pm EDT and have 'official' demonstrations scheduled for 12:00pm EDT, 2:00pm EDT and 4:00pm EDT.  Our goal is  an informal gathering for any tech enthusiasts from the layman to the systems / security engineer to discuss the possibility of some kind of regular gathering on a monthly or quarterly basis (think 2600 meeting or similar).  Ideally, for each event we would have a presenter to kick things off and then discussions, practical excercises, entertainment (Red Team / Blue Team excercises, installfests, etc.) for the remainder of the event.  Lite refreshments would be provided by the host(s).  There would be no charge for the event…
Read More

May 2015 News and Updates

Monthly Newsletters, Uncategorized
What's New Episode Two, The Mobile Threat - The latest episode was released on 19 March and follows our attackers Myles and Ian as they use an executives mobile phone to gain access to (at least) one corporate network, completely under the radar.  Episode Two can be found here. Hacker Play Date - Cyber Tech Cafe will be co-hosting a Hacker Play Date on Saturday, 20 June 2015 at 10:00am EDT.  We have it scheduled until 6:00pm EDT but, depending on interest and turn out, may make adjustments.  Our goal is  an informal gathering for any tech enthusiasts from the layman to the systems / security engineer to discuss the possibility of some kind of regular gathering on a monthly or quarterly basis (think 2600 meeting or similar).  Ideally, for each event we would have…
Read More

April 2015 News and Updates

Monthly Newsletters, Uncategorized
What's New Episode Two, The Mobile Threat - The latest episode was released on 19 March and follows our attackers Myles and Ian as they use an executives mobile phone to gain access to (at least) one corporate network, completely under the radar.  Episode Two can be found here. Resurgence of Crypto style malware (REPOST) - It looks like the Cryptowall style malware is making another round.  There are some details on one variant here but the biggest thing to keep in mind is that, if you get hit with this, you need to consider whatever data is encrypted gone.  There may be a chance that you may get it back if you send a large sum of money via untraceable currency (Moneypak, bitcoin, etc.) to an anonymous person likely in a non-extradition country but a much…
Read More

Security update from Adobe for Flash Player affecting all supported platforms

Uncategorized
Important update for Adobe Flash Player Adobe systems released an update on 12 March for their Adobe Flash product to resolve an issue that could allow a remote attacker to take full control of the affected system.  This update applies to all supported platforms (Windows, Apple / Mac, Linux, etc.) and has been given a Priority Rating of 1, meaning that it's likely being actively exploited already (though I haven't seen exploits listed in exploits-db.org or osvdb.org yet). Details on the vulnerability and it's CVE ID's are available here.  All users are encouraged to update their Adobe Flash installs to the latest version as soon as possible.  Cyber Tech Cafe MyIT clients already have the updated versions available and need only reboot to complete the update.
Read More

Significant Security Updates from Adobe

Uncategorized
Ok, so this is ripped direct from the article on SANS, but Adobe has released several updates with the August updates.  The download in the earlier email also work but, looking at the issues addressed, this is worth a separate post.   Adobe has released security updates for Adobe Flash Player, Adobe AIR, Adobe Reader, and Acrobat. The updates are rated as critical and an impressive number of CVE entries. CVE-2014-0538, CVE-2014-0540, CVE-2014-0541, CVE-2014-0542, CVE-2014-0543, CVE-2014-0544, CVE-2014-0545, CVE-2014-0546. Summary: update now. http://helpx.adobe.com/security/products/flash-player/apsb14-18.html http://helpx.adobe.com/security/products/reader/apsb14-19.html  Cheers,Adrien de BeaupréIntru-shun.ca Inc.My SANS Teaching Schedule   All users are encouraged to install these updates.  These updates will be automatically applied at the next reboot for Cyber Tech Cafe MyIT clients.
Read More

Adobe releases emergency update for Adobe Flash Player

Uncategorized
Emergency Update to Adobe Flash Player affecting Windows, OSX and Linux Adobe has released an emergency update to patch a vulnerability in Adobe Flash Player that is affecting all previous versions for Windows, OSX and Linux.  On Windows and OSX, the [now] current version of Adobe Flash Player is 12.0.0.44 and for Linux, the [now] current version is 11.2.202.336.  Google Chrome users should ensure that they have the latest version of Google Chome and Internet Explorer 10 and 11 users should be certain that they are using the latest version of Adobe Flash Player for the browser.   US-CERT has confirmed that a successful exploitation of this vulnerability could allow an attacker full control of vulnerable systems.   Links: Adobe Security Bulletin US Cert CNet All current Cyber Tech Cafe MyIT Customers…
Read More

Adobe systems / network breached, customer data was accessed

Uncategorized
According to this blog entry from Adobe, there was an attack on the Adobe systems / network and as a result some customer data was compromised.  The article is relatively short and does a good job of detailing what information was compromised.  The short story though is that, if you are an Adobe customer, your information was likely compromised.  Adobe is  Below is a snippet from the article: Our investigation currently indicates that the attackers accessed Adobe customer IDs and encrypted passwords on our systems. We also believe the attackers removed from our systems certain information relating to 2.9 million Adobe customers, including customer names, encrypted credit or debit card numbers, expiration dates, and other information relating to customer orders. At this time, we do not believe the attackers removed decrypted…
Read More