DerbyCon 8.0 EVOLUTION TrustedSec Talks

October 08, 2018 | By:

TrustedSec 2018 Speaker Line-Up Watch the recordings of all our consultants’ talks here: Oddvar Moe Carlos Perez Jason Lang David Boyd Adam Compton Founder and CEO David Kennedy also moderated the Keynote and was on the Opening and Closing Ceremony panels here: Keynote Ceremonies   A proud Platinum sponsor of DerbyCon. Thank you for another amazing…

TrustedSec CEO David Kennedy on CNN, Facebook Security Breach

October 01, 2018 | By:

Founder and CEO, David Kennedy, discusses Facebook largest data breach in the company’s history on CNN 09/28/2018 Watch Facebook Attack: Security Breach Forces Facebook To Log Out 90million Users

TrustedSec CEO David Kennedy on WSJ podcast, ‘The Future of Everything’

September 20, 2018 | By:

In the latest episode of The Wall Street Journal’s podcast, The Future of Everything, the show tracks hackers compromising voting machines and hear from technologists hoping to safeguard democracy with help from blockchain and mobile voting, to understand if it’s possible for tech to protect our democratic process from foreign interference? Listen to Hack the…

Full Disclosure: Microsoft Lync for Mac 2011 susceptible to forced browsing / download attack

September 13, 2018 | By:

What is it? An attacker can force a user who is logged in with Microsoft Lync for Mac 2011 (< v14.4.3) to browse to a URL of their choice via a specially crafted instant message. This vulnerability exists due to poor input sanitation in the processing of message content submitted via PowerShell and the Lync…

TrustedSec CEO Discusses Fancy Bear, Phishing, and Sinkholes in WIRED

August 22, 2018 | By:

  Microsoft recently announced that it seized control of six domains owned by the Russian hacking group Fancy Bear, also known as APT28. TrustedSec CEO Dave Kennedy provided his thoughts on a specific technique used to uncover the group’s phishing attempts in a WIRED magazine article.

TrustedSec CEO Talks Election Security with The Takeaway

August 14, 2018 | By:

How vulnerable are voting machines to hacking? DEFCON26, the world’s longest running and largest hacking conference, brings this topic back into the spotlight. Dave Kennedy joins The Takeaway to explain concerns nation-wide for the election process and more! Listen to the full interview here

Jason Lang on The Tech Night Owl Podcast

August 11, 2018 | By:

This episode presents ethical hacker Jason Lang of TrustedSec, who reports on the goings at a major hacking conference known as Black Hat. It’s one of the top cybersecurity events where a ton of new vulnerabilities and hacker tricks are revealed. This year, as usual, they are revealing new attacks on smartphones, wearables, computers and other personal…

Breaking Down the PROPagate Code Injection Attack

August 08, 2018 | By:

What makes PROPagate unique is that it uses Windows APIs to take advantage of the way Windows subclasses its window events. Check out Senior Security Consultant, Scott Nusbaum’s commentary on DarkReading. Read the full article here

WKYC Interviews Alex Hamerstone About Seemingly Legit Email Scams

July 27, 2018 | By:

CONSUMER ALERT: Watch for an email scam that seems legit, but fools even the smartest people. What looked to be a normal email from a boss made this employee second guess and avoid a purchasing scam known as “shotgunning”. Watch the full interview here

TrustedSec CEO on Cybersecurity of Vehicles and Building a Better System

July 27, 2018 | By:

Car manufacturers, for the most part, are concerned about risks to the mass fleet, not to one car, said David Kennedy, CEO at TrustedSec. “It’s the technology inside the car that needs to be protected, which means having a team come in and tear apart the system to find the vulnerabilities so that the area…