Tag Archives: Hackers

Don’t Be a Victim: How to Prevent Identity Theft (Part One of Two)

Identity theft has become the crime of the new millennium. Most people have heard of it but are unaware of the methodology of these criminals and the ways to prevent them. Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

The Evolution of Cybercrime – Bluetooth Credit Card Skimmers

While you might not think of cyber criminals as business professionals; they face the same economic pressures as legitimate organizations.  As an example, consider the product lifecycle and how manufactured goods go through a sequence of stages from introduction, growth, … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment

Advanced Cyber Training – CompTIA CASP

It is critical that companies take good care of their digital assets and keep them well protected from the cyber criminals. Cyber security requires special attention and care. The advantages of a company being on the Internet are many, yet … Continue reading

Posted in IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

War Texting with your Smartphone to Hack Cars

While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting.  Most remote control automotive systems use a cellular connection embedded in cars to provide these services.  The … Continue reading

Posted in Ethical Hacking, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

One Congressman, One Tweet, Big Problems

Hacking social network sites is nothing new, yet political junkies have been Tweeting over an odd story about New York Congressman Anthony Weiner. It goes something like this: Over the weekend, Weiner’s Twitter account posted a photo addressed to a young … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment

Wikileaks Exposure Points to Bigger Data Security Problems in 2011

I was in DC recently and was looking at some WWII memorabilia that was used during the 1940’s to reinforce the importance of information security. While there were no modern computers, cell phones, or even Internet during this time, the … Continue reading

Posted in Ethical Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment