Tag Archives: Cyber Crime

Grammar Undercuts Cyber Security When Using Long Computer Passwords

Certain long computer passwords may not provide as much cyber security as previously thought. A new study reports that passwords based on grammatical structure give away vital clues that make them more vulnerable to being cracked. Researchers at Carnegie Mellon … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment

Single Use Credit Cards – Is it Right For You?

One way to avoid the danger and pitfalls of online shopping is with single-use credit cards. We discuss what they are and how they benefit you. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

The Evolution of Cybercrime – Bluetooth Credit Card Skimmers

While you might not think of cyber criminals as business professionals; they face the same economic pressures as legitimate organizations.  As an example, consider the product lifecycle and how manufactured goods go through a sequence of stages from introduction, growth, … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment

Advanced Cyber Training – CompTIA CASP

It is critical that companies take good care of their digital assets and keep them well protected from the cyber criminals. Cyber security requires special attention and care. The advantages of a company being on the Internet are many, yet … Continue reading

Posted in IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

One Congressman, One Tweet, Big Problems

Hacking social network sites is nothing new, yet political junkies have been Tweeting over an odd story about New York Congressman Anthony Weiner. It goes something like this: Over the weekend, Weiner’s Twitter account posted a photo addressed to a young … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , | Leave a comment

Wikileaks Exposure Points to Bigger Data Security Problems in 2011

I was in DC recently and was looking at some WWII memorabilia that was used during the 1940’s to reinforce the importance of information security. While there were no modern computers, cell phones, or even Internet during this time, the … Continue reading

Posted in Ethical Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

Top Ten Places Cyber Criminals Go to Steal Your Identity

Are you ever uneasy about all the companies that want your social security number and other personal information?  A recent study compiled by McAfee, featured on eSecurity Planet, listed the top ten most hacked industries. While the Internet has brought … Continue reading

Posted in Hacking | Tagged , , , , , , | Leave a comment