Author Archives: admin

The Prevalence of Cyber Crime

While many people acknowledge the prevalence of hacking and cyber crime, many, including businesses, do not take the necessary steps to ensure their cyber security. Even though there have been so many big cyber hacking cases exposed such as Target, … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment

The CISSP Exam Update and Eight Domain Rewrite for 2015

For individuals considering the (ISC)² CISSP exam, you need to be aware of a major update that will go into effect April 1, 2015.  Gone are the ten domains that have been with us for many years. Here are the … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Research Shows Businesses are Prime Targets for Cybercrime

High profile security breaches such as Target, Snapchat, and Neiman Marcus often make headlines. However, research shows that both large and small businesses are targets of cybercrime. Verizon published a data breach investigations report that looked at 621 confirmed incidents … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

Everyone Needs to be Responsible for Cyber Security

The threat of cyberspace attacks are a significant concern for businesses and individuals. The Internet is a great resource for finding information and to make a purchase. However, the use of personal data when online is a valid concern for … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , , , , | Leave a comment

Grammar Undercuts Cyber Security When Using Long Computer Passwords

Certain long computer passwords may not provide as much cyber security as previously thought. A new study reports that passwords based on grammatical structure give away vital clues that make them more vulnerable to being cracked. Researchers at Carnegie Mellon … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Did “Russian speaking operatives” create the Red October malware to invade specific organizations’ computers, networks and smartphones?

Last October, a world-name in IT anit-virus security and research, Kaspersky, revealed the workings of five-year old malware program hitting on networks throughout “diplomatic, governmental and scientific research organizations,” according to a post on SecureList.org, “The Red October Campaign…An Advanced … Continue reading

Posted in Cyber security, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Ramping up cyber security means shutting down Botnets

It’s no wonder today’s cyber criminals can continue to gorge themselves on our vulnerable networks: It’s just plain easy, according to a post by Brian Prince, “Cybercrime Inc.: The Business of the Digital Black Market.” For example, cyber criminals can … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , | Leave a comment

How Cyber Security Training Can Protect Your Business From Hackers

Nowadays, almost every business needs a corporate website to function. When your business depends on a network to run, it is also exposing itself to a lot of risks. Network security breach is one such risk. When information about your … Continue reading

Posted in Cyber security, IT and Computer Security | Tagged , , , | Leave a comment

Businesses Must Be Proactive With Cyber Security Policies

Security breaches and intrusions have been in the spotlight as businesses across several sectors have reported damaging intrusions into their networks. Many of these have resulted in the theft of consumer personal data, or even worse, sensitive government information. Unfortunately, … Continue reading

Posted in Cyber security, Ethical Hacking, Training and Education | Tagged , , , | Leave a comment