Category Archives: Hacking

Your Social Media Is Being Attacked! (Part 2)

In our last article, we talked about how having a social media account can leave you exposed to potential hacks from cybercriminals who are looking to take advantage of your friends and followers for scams and spam. Now, let’s examine how the material you post online can be used against you by these same cybercriminals. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Your Social Media Is Being Attacked! (Part 1)

In this first of two articles, we will take a look at how your social media can be used by hackers and why it is so vulnerable. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

What To Do When You’ve Been Hacked?

It is imperative that you know exactly how to deal with a cyber security hack attack on your system. Having a plan in place ahead of time will prevent fumbling and confusion in the event that a hack does take place. Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Uncategorized | Tagged , , | Leave a comment

Tips for Finding Qualified Penetration Testers for Your Website

Here are some tips for finding a good, qualified penetration tester or white hat hacker. Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Uncategorized | Tagged , , | Leave a comment

Top Ethical Hacking Books

How does a security specialist learn the tricks of hackers? Fortunately, there are several books available which provide guidance on how to be a “white hat hacker” so as to secure your own computer network. Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security, Security Certification, Training and Education, Uncategorized | Leave a comment

Do Movies Make Hacking Seem Glamorous?

While we have previously blogged about CISSP movie concepts, the fact is that many of the depictions of hackers in film tend to go towards extremes Continue reading

Posted in Hacking, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Identify IT Vulnerabilities with a Security Assessment

The IT infrastructure for a business may have hidden vulnerabilities that can expose data to many types of risks. One way to identify vulnerabilities on a system is to perform a security assessment. A strategic company that can perform ethical … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, IT and Computer Security | Tagged , , , , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment