Author Archives: admin

Blackberry May Allow Some Monitoring by Government Entities

It looks like Saudi Arabia has succeeded in forcing RIM to allow access to a portion of its data as it flows through the cell phone network.  The proposed deal with Saudi Arabia should seem like a real victory to … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , | Leave a comment

Smartphones Come Under Fire for Security Issues

It seems that this is going to be the year that smartphones start to get more security exposure.  In December of 2009, President Obama’s cyber czar commented on the rising threat of smartphone attacks. The iPhone has been targeted with … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Are BlackBerry’s a Security Risk as the UAE claim?

The United Arab Emirates (UAE) is calling BlackBerry devices a security risk. The UAE telecom regulator has stated, “BlackBerry operates beyond the jurisdiction of national legislation.”  BlackBerrys are the only devices used in the country that have data managed by … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , , | Leave a comment

Ethical Hacking Cloud Computing Concerns

Cloud computing is something that continues to grow in popularity. While cloud computing offers many benefits, there are significant security concerns when considering moving critical applications and sensitive data to public and shared cloud environments.  Some items to consider include: … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment

Web Cam Hacking

While web cameras make it easy to keep in touch with friends and family it is possible for these devices to be hacked. If you have a web cam on your laptop or home computer, hackers may target these devices.  … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

IT Security Certifications and the Importance of Continued Security Training

One of greatest challenges that America is facing today is to help its adults gain marketable IT security skills and postsecondary training credentials the workforce will need to ensure continued prosperity for our country in the 21st century global economy. … Continue reading

Posted in Training and Education | Tagged , | Leave a comment

Wireless Vulnerabilities are a Tempting Target for Cyber Criminals and Hackers

Wireless continues to be a big security concern as it is a primary attack vector for hackers.  It is also something that needs to be closely examined during a security assessment.   Even if your not part of a ethical hacking … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Assessing Malware Found During a Network Security Assessment

If there is anything to be learned from the continued security breaches and cyber attacks that we’ve witnessed this year is that companies must have a good incident response plan in place and be prepared to deal with advanced threats … Continue reading

Posted in Ethical Hacking | Tagged , , , , , | Leave a comment

Are You Getting a Charge Out of Hacking?

You may be getting a charge out of hacking if you are using the Energizer DUO USB Battery Charger.  This battery charger comes with software to allow Windows users to monitor the status of the batteries while they are charging.  … Continue reading

Posted in Ethical Hacking | Tagged | Leave a comment

Hackers Plan to Cash in During Last Minute Rush of Tax Filing Season

While many of us may be thinking of ways to spend our tax returns, hackers are busing thinking of ways to steal our money. The possibilities are endless: Identity theft – Someone else filing your return using your social security … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment