-
03. Firewall (2006)
https://fast.wistia.net/embed/iframe/talcxthw12?web_component=true&seo=true GET OFF MY... FIREWALL? Doesn’t have the same punch as a PLANE. Harrison Ford’s family is held hostage (oh no!) by Paul Bettany and crew. Tom and I watch this by-the-numbers cyber-action thriller. We’ll also answer the question everyone has been…
-
01. The Net (1995)
https://fast.wistia.net/embed/iframe/lzu25c9ln9?web_component=true&seo=true Movies and Mainframes’ inaugural episode! The year is 1995 and only one thing is at the top of everyone’s mind: why did they discontinue Crystal Pepsi? Also, The Net came out in theaters. Tom and I will take a deep dive into this cyber-thriller…
-
02. Sneakers (1992)
https://fast.wistia.net/embed/iframe/144ccamoag?web_component=true&seo=true Sneakers is a star-studded classic! Robert Redford, Sidney Poitier, Dan Aykroyd, Mary McDonnell, River Phoenix, David Strathairn, and Ben Kingsley rocking a sweet, sweet ponytail. Tom and I discuss Ben Kingsley’s accent - is he British, from New…
-
Hacking For Regular IT People - Where to Start?
If you’ve developed a desire to learn more about hacking or to try a little hacking yourself, there are a lot of resources at your disposal to get started. Keep in mind, our premise here is how to hack without breaking any laws, which is important to remember. That being said, there’s nothing illegal about talking about…
-
Ubisoft Hacked, Got A New Game Plan?
Who is Ubisoft? Ubisoft Entertainment is a French global video game publisher and developer, and is one of the largest independent game publishers in Europe and the United States. Do you remember playing Assassin’s Creed and Price of Persia? Those were from Ubisoft. Hacking? What Happened? One of Ubisoft’s websites was…
-
Hacking for Regular IT People - Toys and Tools
In most office environments, power strips or surge protectors are a normal, everyday device that most of our computers, printers, copiers, etc. are plugged into. They’re fairly innocuous and probably something we take for granted, right? Just a normal piece of equipment in our office. What if that power strip was actually…
-
Hacking for Regular IT People - Certifications
You’ve read up on the history of hacking, its motivations, and benefits for you as an IT professional. You’ve watched videos and read technical books on hacking tools and even spent a few hard-earned dollars on some nifty hacking gadgets to learn from on your own personal hack-lab playground. Now what? What can you do with…
-
Hacking for Regular IT People - History and Evolution
For most people these days, the word “hacking” conjures images of nefarious intruders attempting to gain illegal access to financial institutions, corporations, and private citizens’ computers for theft and profit. Exploitation of unsecured computer systems, cloud services, and networks make headlines daily, with large…
-
Reaction to GRIZZLY STEPPE - how many of the mitigation strategies are you already doing?
GRIZZLY STEPPE is what the Joint Task force (NCCIC & FBI) code-named two specific Russian cyber security attacks on the US in their joint analysis report. To realize in both instances that it was a single user reaction to a spear fishing attack that enabled the hacking, really makes me wonder about how to truly harden an…
-
Right on 'TARGET': 40 Million Credit Card & Debit Card Data Stolen
In what is one of the most calamitous cyber-crime attacks that organizations storing personally identifiable information and card-holder data have faced, Target Corporation, one of America’s leading and reputed retailing company and chain of retail stores, has succumbed to a data breach that allowed hackers to compromise,…