Tag Archives: attack

Tax Scams – Three Ways Hackers Plan to Steal Your Tax Return in 2017

Experts warn that there are several fraudulent tax scams as this year’s tax season begins. Taxpayer data is vulnerable and hackers are using several different techniques in 2017 to target your tax return. Three ways hackers can cash-out on unsuspecting … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , , | Leave a comment

Ramping up cyber security means shutting down Botnets

It’s no wonder today’s cyber criminals can continue to gorge themselves on our vulnerable networks: It’s just plain easy, according to a post by Brian Prince, “Cybercrime Inc.: The Business of the Digital Black Market.” For example, cyber criminals can … Continue reading

Posted in Cyber security, Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

The Evolution of Cybercrime – Bluetooth Credit Card Skimmers

While you might not think of cyber criminals as business professionals; they face the same economic pressures as legitimate organizations.  As an example, consider the product lifecycle and how manufactured goods go through a sequence of stages from introduction, growth, … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment

Wikileaks Exposure Points to Bigger Data Security Problems in 2011

I was in DC recently and was looking at some WWII memorabilia that was used during the 1940’s to reinforce the importance of information security. While there were no modern computers, cell phones, or even Internet during this time, the … Continue reading

Posted in Ethical Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

Smartphones Come Under Fire for Security Issues

It seems that this is going to be the year that smartphones start to get more security exposure.  In December of 2009, President Obama’s cyber czar commented on the rising threat of smartphone attacks. The iPhone has been targeted with … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Are BlackBerry’s a Security Risk as the UAE claim?

The United Arab Emirates (UAE) is calling BlackBerry devices a security risk. The UAE telecom regulator has stated, “BlackBerry operates beyond the jurisdiction of national legislation.”  BlackBerrys are the only devices used in the country that have data managed by … Continue reading

Posted in Smart Phone Hacking | Tagged , , , , , | Leave a comment

Ethical Hacking Cloud Computing Concerns

Cloud computing is something that continues to grow in popularity. While cloud computing offers many benefits, there are significant security concerns when considering moving critical applications and sensitive data to public and shared cloud environments.  Some items to consider include: … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment