Citizens First Cyber Security Professionals cfcspro.com

Login

Username

Password



Not a member yet?
Click here to register.

Forgotten your password?
Request a new one here.

Connect via Facebook

Connect via Facebook

Member Poll

There are no polls defined.

Shoutbox

You must login to post a message.

02-12-2017 12:08
Yo' Citizens, How you doing today. Todays Lesson plans & post will consist of, How to give spammers a taste of their own medicine! Cool

20-10-2017 11:38
Yo' Citizens, As per your request. A new forum section, 'Suspicious IP Addresses' will be completed today! Cool

20-10-2017 11:30
Yo' Good Morning Citizens. I hope that you are all having a great and cyber-secure day! Grin

09-10-2017 11:10
Yo' Good Morning Citizens! Wink I hope that you had a cyber-secure weekend! Grin

03-10-2017 10:44
Yo' Citizens, good morning. I have some pretty serious vulnerabilities to share with you, today. I will have them up shortly! Cool

Welcome Citizens

Welcome to, Citizens First Cyber Security Professionals.

The Individual Citizen Specific, Cyber Security Investigative Services Firm. Cyber Security Web Forum and Educational Cyber Security Dojo.

Geared strictly to helping Individual Citizens and Small Businesses! Address unwanted cyber security intrusions and hacking incidents!

NASA Has Just Released Tons Of Free And Open Source Software, Here’s How To Get Them

SoftwareNASA Has Just Released Tons Of Free And Open Source Software, Here’s How To Get Them - Via Fossbytes.com

A flaw in ESET Endpoint Antivirus allows to hack Apple Macs, patch it now

SecurityA flaw in ESET Endpoint Antivirus is exploitable to get remote root execution on Apple Mac systems via Man-In-The-Middle (MiTM) attacks.

WHO'S THAT HACKER: Profiling the Attackers. *REPOST

Security*REPOST!

Yo' Citizens,
This article is a must read for all citizens. Below is just a taste.

From The White Hat Security Blog.

WHO'S THAT HACKER: Profiling the Attackers

In every crime, the police work hard to determine the basics of Who, Where, When, Why, and How. The process is the same in the cyber landscape where IT security professionals try to figure out what's going on with crime targeting their organization, be it a Public or Private enterprise. Where the percentages of the main threat actor and types of attack may change by industry vertical or sector, the types of actors involved are the same: There are good guys and bad guys, and sometimes people that make mistakes.

Armed with information about the types of threat actors and their respective motivations, organizations can start to tell their enemies from their allies and learn how to thwart the first while educating and supporting the second.

Learn more by reading the full story, click here: https://www.whitehatsec.com/blog/profiling-the-attackers/?platform=hootsuite

Thank You Citizens,
The Administration
Citizens First Cyber Security Professionals
cfcspro.com

Prepare yourself against Cyber Ransomware Attacks

DownloadsPrepare yourself against Cyber Ransomware Attacks
Yo Citizens,

Prepare for Cyber Ransom -Radware radware.com

Download the Pdf handbook for FREE!

Protect yourself and your information from cyber criminals, before its to late!

Yo' Citizens, this is for those of you who think; This isn't going to happen to me!

https://www.radware.com/social/cyberransomebook/?utm_source=fb_ads&utm_medium=fb_feed&utm_term=CyberRansom_0914_H1T1&utm_content=H1T1&utm_campaign=fb_ads_fb_feed_CyberRansom_0914

Thank You Citizens, For Your Time!

Brooklyn

Cross Site Scripting - XSS Cheat Sheet *REPOST!

Bugs*REPOST!

Yo' Citizens,

Cross Site Scripting - XSS Cheat Sheet by Sikic techean.com


Cross Site Scripting or XSS is most common vulnerability in modern web applications. OWASP Top 10 is a list of top 10 web vulnerabilities, Cross Site Scripting is listed on third place. This article contain table of Basic and advanced exploits for XSS proofs and attacks.

Get It FREE here: http://techean.com/cross-site-scripting-cheat-sheet/

Thank You Citizens, For Your Time,

The Administration

15 vulnerabilities in SAP. *REPOST

Bugs*REPOST!

Greetings Citizens,


SAP recently fixed 15 different vulnerabilities that existed in the database management system HANA and subsequent communication channels used by the software. All told the vulnerabilities affect just north of 10,000 SAP customers running different versions of the system, according to researchers at Onapsis, who disclosed the bugs Thursday.

See more at: 15 Vulnerabilities in SAP HANA Outlined https://wp.me/p3AjUX-v3U

Thank you Citizens, for your time.
The Administration

Yo' Citizens, The Hacker Playbook 2 - Practical Guide To Penetration Testing [PDF] For FREE!! *REPOST!

Security*REPOST

Yo' Citizens,

The Hacker Playbook 2 - Practical Guide To Penetration Testing [PDF] For FREE!! K4linux Team - k4linux.com


K4linux team share withe you today one of the beautiful Hacking Ebook, this wonderful practical guide to penetration testing The Hacker Playbook 2 that you can use to learn how to be professional on penetration testing and as you know all the tutorials on this ebook are explained on Kali Linux.

Citizens, Get It Here: http://www.k4linux.com/2016/07/the-hacker-playbook2-penetration-testing-pdf.html?utm_content=buffer1e0ad&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer

Thank You Citizens, For Your Time!

The Administration

DoJ Official Tells Hundred Federal Judges to Use Tor. *REPOST!

News*REPOST!

Greetings Citizens,

Department of Justice Official Tells Hundred Federal Judges to Use Tor
Written by
Joseph Cox
Contributor

August 6, 2016 // 12:00 PM EST
[uri]http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor[/url]


The US government has a complicated relationship with Tor. While the US is the biggest funder of the non-profit that maintains the software, law enforcement bodies such as the FBI are exploiting Tor browser vulnerabilities on a huge scale to identify criminal suspects.

To add to that messy, nuanced mix, one Department of Justice official recently personally recommended Tor to a room of over a hundred federal judges.

Ovie Carroll, director for the Cybercrime Lab at the Department of Justice, urged the judges to �use the TOR [sic] network to protect their personal information on their computers, like work or home computers, against data breaches, and the like,� Judge Robert J. Bryan said in July, according to a hearing transcript released on Friday.

Read More At: http://motherboard.vice.com/read/department-of-justice-official-tells-hundred-federal-judges-to-use-tor

Thank you Citizens, for your time.
The Administration
cfcspro.com

Happy New Year!!

NewsYo' Citizens,

Happy New Year!!

Welcome to 2017!
I hope that this year finds you to be happy, healthy, prosperous, and cyber-secure!
We have some great stuff to teach you this year, we know that the information we provide you citizens,
will help you keep your private information, better "Protected and Private" as well as a lot more cyber-secure from unwanted prying eyes.

I hope that all of you citizens have a great year!

Thank You,
Andrew Simon
The Administrator
www.cfcspro.com

Download: The Hacker Playbook 2 - Practical Guide To Penetration Testing [PDF] For FREE!

SecurityDownload: The Hacker Playbook 2 - Practical Guide To Penetration Testing [PDF] For FREE!

Cross Site Scripting XSS Cheat Sheet by Sikic techean.com

BugsCross Site Scripting or XSS is most common vulnerability in modern web applications.

Prepare yourself against Cyber Ransomware Attacks

SecurityPrepare for Cyber Ransom -Radware radware.com

Download the Pdf handbook for FREE!

Yo' Citizens! This Starts Today!! US to Transfer Internet!

NewsYo Citizens,

This Starts Today!!

US to Transfer Internet DNS Oversight After GOP Sabotage Effort Fails
Written by Sam Gustin - Correspondent - motherboard.vice
October 1, 2016 // 01:00 PM EST

The United States government moved to relinquish stewardship of key internet technical functions on Saturday, paving the way for a private, international non-profit group to assume oversight of the internets core naming directory.

Starting Saturday, stewardship of the Internet Assigned Numbers Authority (IANA) functions, including the DNS, which translates website names like vice.com into numeric internet protocol (IP) addresses, will be fully overseen by a Los Angeles-based nonprofit group of international stakeholders called the Internet Corporation for Assigned Names and Numbers (ICANN). Read Full Story: Link
Thank You Citizens,
Brooklyn

Linux bug leaves USA Today, other top sites vulnerable to serious hijacking attacks

NewsYo' Citizens, How you doing today.
I hope that all is well in your life, and that your day online today finds you to be cyber-secure. This is why I do my best to explain to all citizens, "Everyone who connects to the Internet, is vulnerable to having their information hacked". But I can help you make your information much harder to get too!

Linux bug leaves USA Today, other top sites vulnerable to serious hijacking attacks

Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections between virtually any two parties and, if the connections aren't encrypted, inject malicious code or content into the parties' communications.

The vulnerability resides in the design and implementation of RFC 5961, a relatively new Internet standard that's intended to prevent certain classes of hacking attacks.

Please read the full story by clicking here:Linux Bug Leaves USA Today, and other top sites vulnerable!

Thank you citizens,
The Administration
Citizens First Cyber Security Professionals
cfcspro.com

WHOS THAT HACKER: Profiling the Attackers

SecurityYo' Citizens,
This article is a must read for all citizens. Below is just a taste.

From The White Hat Security Blog.

WHOS THAT HACKER: Profiling the Attackers


In every crime, the police work hard to determine the basics of Who, Where, When, Why, and How. The process is the same in the cyber landscape where IT security professionals try to figure out whats going on with crime targeting their organization, be it a Public or Private enterprise. Where the percentages of the main threat actor and types of attack may change by industry vertical or sector, the types of actors involved are the same: There are good guys and bad guys, and sometimes people that make mistakes.

Armed with information about the types of threat actors and their respective motivations, organizations can start to tell their enemies from their allies and learn how to thwart the first while educating and supporting the second.

Learn more by reading the full story, click here: https://www.whitehatsec.com/blog/profiling-the-attackers/?platform=hootsuite

Thank You Citizens,
The Administration
Citizens First Cyber Security Professionals
cfcspro.com
top image scrolling tools
facebook_share
twitter_share
google_share
linkedin_share
blogger_share
delicious_share
scrolltop
Render time: 0.06 seconds
256,183 unique visits