Category Archives: Ethical Hacking

What Color is Your Cyber Hat?

People associate the term “hacker” with an individual who has malicious and/or criminal intent, has enough knowledge about computers to make them very dangerous, and are not to be trusted. Sometimes, they might be right. Sometimes, they couldn’t be farther from the truth. Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Tagged , , , , | Leave a comment

The Evolution of Cybercrime – Bluetooth Credit Card Skimmers

While you might not think of cyber criminals as business professionals; they face the same economic pressures as legitimate organizations.  As an example, consider the product lifecycle and how manufactured goods go through a sequence of stages from introduction, growth, … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment

SSCP Certification to be Updated in 2012

The CISSP exam is not the only ISC2 exam due to be updated in 2012.  The SSCP certification will also undergo some changes.  Some topics have changed.  The 2012 SSCP 2012 domains are: Access Controls Security Operations and Administration Monitoring … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

War Texting with your Smartphone to Hack Cars

While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting.  Most remote control automotive systems use a cellular connection embedded in cars to provide these services.  The … Continue reading

Posted in Ethical Hacking, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment

The New CompTIA CASP Certification

Later this year, CompTIA will be releasing the CompTIA Advanced Security Practitioner (CASP) certification.   It is time for this certification. It’s targeted directly at individuals that have worked in security for a number of years in “hands-on” security.  We are … Continue reading

Posted in Ethical Hacking, Security Certification, Training and Education | Tagged , , , , , | Leave a comment

Cyber Security Risks for Online Users

Did you know that a report by Sophos in 2009 found that a malicious web site is detected about every 5 seconds? Since then, the pace has only increased.  Internet users must implement basic protections to stay safe while surfing … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

Wikileaks Exposure Points to Bigger Data Security Problems in 2011

I was in DC recently and was looking at some WWII memorabilia that was used during the 1940’s to reinforce the importance of information security. While there were no modern computers, cell phones, or even Internet during this time, the … Continue reading

Posted in Ethical Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

The DHS Cyber Security Infrastructure Protection Act of 2010

What are your thoughts on giving DHS oversight over portions of the Internet?  A new bill, HR 6423, is planning on doing just that.  This bill would give DHS the right to regulate portions of the Internet that is deemed … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment