Tag Archives: Cyber Security

Cyber Security At Home – Are Neighbors Pirating Your Wi-Fi?

To a growing number of Internet piggy-backers, the sweet sound of pirating their neighbor’s wireless network sounds like a good way to get free Internet and this could be a real problem for you. Continue reading

Posted in IT and Computer Security, Uncategorized | Tagged , | Leave a comment

Tips to Protect Your Customer’s Payment Information

Did you know that your unexpired credit card is worth as little as $0.06 and as much as $1000 on the black market? Cyber security experts explain that the “street value” of a stolen credit card number can vary widely depending on the status of the account, credit limit available, expiration date, and whether there is a physical-issued card to be sold as well. Continue reading

Posted in IT and Computer Security, Training and Education, Uncategorized | Tagged , , , , , , , , , , | Leave a comment

SSCP Certification to be Updated in 2012

The CISSP exam is not the only ISC2 exam due to be updated in 2012.  The SSCP certification will also undergo some changes.  Some topics have changed.  The 2012 SSCP 2012 domains are: Access Controls Security Operations and Administration Monitoring … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

CompTIA CASP Certification Training

The CASP exam has gone live and is now available for those interested in the certification.  I would rate this as a somewhat difficult test.  CompTIA is looking for ten years experience in network administration including at least five years … Continue reading

Posted in IT and Computer Security, Security Certification, Uncategorized | Tagged , , , , , , , , , | Leave a comment

War Texting with your Smartphone to Hack Cars

While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting.  Most remote control automotive systems use a cellular connection embedded in cars to provide these services.  The … Continue reading

Posted in Ethical Hacking, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

One Day CISSP Boot Camp/Seminar, Saturday, July 30, 2011

Are you looking for that extra edge to get ready for the CISSP exam?  Superior Solutions will be offering a one day CISSP exam prep class to help you prepare for the CISSP certification on Saturday, July 30th, 2011 from … Continue reading

Posted in Security Certification, Training and Education | Tagged , , | Leave a comment

CASP: CompTIA Advanced Security Practitioner – Beta Exam Results

CompTIA has wrapped up the beta exam for the Advanced Security Practitioner (CASP).  The beta was 92 questions and test candidates were given 135 minutes to complete it which works out to about 1 ½ minutes per question.  This may … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

One Congressman, One Tweet, Big Problems

Hacking social network sites is nothing new, yet political junkies have been Tweeting over an odd story about New York Congressman Anthony Weiner. It goes something like this: Over the weekend, Weiner’s Twitter account posted a photo addressed to a young … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , | Leave a comment

Are you Ready for Cloud Computing?

Cloud computing offers many benefits, but, it also changes the security equation. Historically, companies kept critical data behind firewalls.  Cloud computing is having a huge impact on the de-perimiterization of network boundaries.  It’s a game changer in that assets are … Continue reading

Posted in IT and Computer Security, Training and Education | Tagged , , , , | Leave a comment