Today’s Advisories

CISCO scores a perfect 10 on vulnerability. Fixes available. DO IT NOW!

This vulnerability is critical.  CVE-2018-0101 is ranked 10 out of 10 for severity. That means it can be easily exploited, remotely exploited and no authentication required. There are no workarounds “so customers must either disable the ASA VPN functionality or install updated OS versions”.  Get yer patches up now!

Cisco says that an attacker can send malformed XML packets to such devices and execute malicious code on the device. Depending on the code’s nature, an attacker can gain control over the device.

It affects any devices running ASA Adaptive Security Appliance software only if they have the “webvpn” feature is enabled in the OS settings. You can find more information about  ASA Software version numbers for fixed releases in Cisco’s CWE-415 security advisory.

Per Bleeping Computer

New Ransomware GandCrab being delivered by RIG exploit kit. 

This one requests DASH cryptocurrency which is apparently harder to trace by law enforcement. Ransom is 1.54 DASH or $1170 USD. It apends .GDCB to files it encrypts. Here’s how victims will know it’s too late:

At some point, the ransomware will relaunch itself using the command “C:\Windows\system32\wbem\wmic.exe” process call create “cmd /c start %Temp%\[launched_file_name].exe”. If a user does not respond Yes to the below prompt, it will continuously display the UAC prompt.

Be advised: there is NO decryptor currently available for GandCrab.  Follow the standard security protocols to keep your data and systems safe.

  1. Use antimalware security software that incorporates behavioral detections to combat ransomware like Malwarebytes or Emsisoft Antimalware
  2. Scan attachments with tools like VirusTotal.
  3. Have all current updates, especially for Java, Adobe, Windows

Per Bleeping Computer

Yes Virginia, Dreams Really Do Come True!


Sorry to have neglected you this past while. Big changes have happened. But that’s a good thing. A really good thing. And something I hope to carry forward.

You may have heard about the lack of talent in cyber security. And the lack of women in tech. And the resulting lack of women in cyber security. I am thrilled to tell you that I have now changed that statistic by one.

Yes Virginia, dreams really do come true. Because  I was offered the role of my life. My dream job.

I now do Threat Intel with the cyber security team at KPMG. As a cyber security consultant.

Repeat after me:

OMG! OMG! OMG!  Now breathe. (that really was fun, wasn’t it!)

Now I can stay up all night, every night, looking for cyber boogeymen and playing what-if til I can’t keep my eyes open. And people actually want to know about what I find. Oh, holy cow – it is amazing!

I have to learn more about all. the. things. Which is fantastic because I like all the things. Networks. SCADA ICS. Mainframes. Web Application Firewalls. And of course my 3 favourite letters: APT or Advanced Persistent Threat. Because the biggie of all those, Stuxnet, is what led me here in the first place.  I get to work with amazing people whose knowledge and skill just inspires me every day to do more.  We plan and build and evaluate things most people have no idea about, but that will actually make the world a better and safer place for everyone. And that is the realization of one of many childhood dreams. I still haven’t walked onto a Starfleet Enterprise class ship yet, but believe me, this is what it would feel like.

And this is where I tell you the really good stuff. That you have it in you to make your version of this happen. I stopped listening when people told me “you can’t do that” or “you  got that all wrong” or “maybe you’d be better at’.  I listened to that voice inside me, that passion pushing me further even when it seemed impossible. Even when I couldn’t understand it the first time, or someone said no, and said no again.  Because something inside of me wouldn’t let it go. I loved it too much.  Listen to that piece of you that won’t let go.  Find that thing you love enough to fight for it – and fight.  You deserve the sweetness of this victory. And oh, if it can happen for someone like me without all the proper degrees and traditional routes, then it can happen for you. Believe.

So come along and join me for my next incredible, amazing adventure. I’m only just getting started!

(Necessary Disclaimer bit that all these posts are my own and not my employer’s)

IOS8 – What You Should Know Before You Update


You’re excited. It’s finally here. And like opening a shiny new present you can’t wait to install it. STOP! This is fortress security, where we don’t rush headlong into disaster, and you don’t either.

First – backup your device. Never make any changes to your tech without having a recent backup first. Because stuff happens, and it always happens when you didn’t take a backup. Consider it your insurance policy. If you haven’t done one yet, there’s no time like the present. Given how many people say their lives are in their phones, that’s reason enough. Don’t rely on the cloud, but do a tangible, retrievable backup to a computer and save it to iTunes. Move off some photos, videos, anything to ensure you have 1.4 GB of empty storage space. The upgrade isn’t for everyone. iPhone 4 and original iPads are too old.  Still eligible are 4S, 5, 5C, 5S, iPads 2, 3, 4 , Air and Mini. Allow between 30 minutes to an hour for the upgrade to complete and don’t expect to use your phone during that time. And then, the fun begins.

Expect to find lots of little changes to the old familiar: App store, iTunes store, multi-tasking and Spotlight. New are privacy controls and the iCloud keychain, a security feature for passwords etc. The new Apple Pay feature won’t be offered until October, and this is only for iPhone 6 and 6plus.

The iOS 8 Keyboard:  it’s predictive, which takes some getting used to but is helpful. And a whole new host of Emoji. Plus it supports third-party keyboards that allow for swipe-typing. Crazy as it looks, it works! I know, I use it.

Safari has a credit card reading feature in iOS8 so that you can scan your cards and have the information put directly onto the website page.  I’m not ready to recommend that yet, given the recent surge of security and data breaches, and knowing Apple products have fallen victim to targeted malware attacks and email schemes to lure users.

I do like, however, that a new feature lets you track apps that are battery hogs.  Just follow these steps:

  1. Open Settings
  2. Navigate to General | Usage | Battery Usage

After a few moments, the Battery Usage section will appear, and display those apps using the most power.


You may like that in the Photos App, you can view only those videos you shot, which are stored in their own album. Want some of those photos to briefly disappear? You can now tap and hold until a menu appears, then select Hide.

Find My iPhone: Send last location before battery dies. Find my iPhone/iPad/iPod Touch now can send the last known location from your device to iCloud before the battery dies. We know what that’s like. Here’s how to set things up:

  1. Open Settings
  2. Tap iCloud | Find my [device type]
  3. Turn on the option for Send Last Location

Note that if you use WiFi and aren’t near an access point, this may not be able to work.

And finally, font size. When iOS 7 came out, it came with the option to change font size throughout the system.  But it was hard to find. Here is how to find the setting in iOS 8:


Hopefully this gets you up and running, so you can start enjoying all the new features. Because technology should be fun and friendly. Just like me!