Author Archives: admin

The DHS Cyber Security Infrastructure Protection Act of 2010

What are your thoughts on giving DHS oversight over portions of the Internet?  A new bill, HR 6423, is planning on doing just that.  This bill would give DHS the right to regulate portions of the Internet that is deemed … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

Employee Access Review – Preventing Access Creep

Access creep is a common problem and one way that employees sometimes end up with a greater level of access than what they should have.  One of the items we examine during a security assessment is employee access. While reviewing … Continue reading

Posted in Ethical Hacking, IT and Computer Security | Tagged , , , | Leave a comment

CompTIA Ready’s an Upgrade to the Cyber Security Foundations Cert: Security+ SY0-301

If you’ve been putting off obtaining your Security+ certification and are not going to attempt the exam before December 31, 2010, you may want to wait until the new version of Security+ SY0-301 is released.  CompTIA is planning the new … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , , , | Leave a comment

Michael Gregg Demo’s how Snooping on Strangers is Made Easy with Firesheep

I blogged about sidejacking last week.  This is a common threat and one that cyber security experts have identified as a major security flaw since at least 2004. Fox News asked Michael Gregg to stop by their studio and demonstrate … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment

Firesheep Hijacking Tool Makes Hacking For Dummies a Reality

Over the years, there has been a steady progression of polished, easy to use tools that have lowered the bar for hackers. Firesheep is a good example of one such tool. Firesheep was designed to highlight how many web sites … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , | Leave a comment

Top Ten Places Cyber Criminals Go to Steal Your Identity

Are you ever uneasy about all the companies that want your social security number and other personal information?  A recent study compiled by McAfee, featured on eSecurity Planet, listed the top ten most hacked industries. While the Internet has brought … Continue reading

Posted in Hacking | Tagged , , , , , , | Leave a comment

How Effective Study Skills can help you Achieve your CISSP Certification

Since not everyone studies in the same manner, what works for one person may not work for someone else.  If you are looking to obtain your CISSP, CISA, CISM CEH, or really any IT security certification you will need to … Continue reading

Posted in Security Certification, Training and Education | Tagged , , , | Leave a comment

CompTIA’s moving beyond cyber security foundations to develop an advanced IT security certification

While CompTIA is widely known for their foundational coverage of networking and security, they are now developing a more advanced security certification, the CompTIA Advanced Security Practitioner (CASP).   While this advanced security certification is still in the development phase, what is … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , , , | Leave a comment

Stuxnet changes cyber security battlefield

While many things are unknown about Stuxnet, what is known is that it marks a critical change in cyber war.   So much so that Kaspersky labs describes it as “a prototype of a cyber-weapon that will lead to the creation … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment

MagicJack Hacking

MagicJack is a great device for those traveling abroad or anyone needing an occasional extra phone.  The only real problem is when you happen to forget the MagicJack adapter or in situations when it’s just not possible to plug in … Continue reading

Posted in Ethical Hacking, Smart Phone Hacking | Tagged , , , | Leave a comment