Tag Archives: Hackers

The DHS Cyber Security Infrastructure Protection Act of 2010

What are your thoughts on giving DHS oversight over portions of the Internet?  A new bill, HR 6423, is planning on doing just that.  This bill would give DHS the right to regulate portions of the Internet that is deemed … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

CompTIA Ready’s an Upgrade to the Cyber Security Foundations Cert: Security+ SY0-301

If you’ve been putting off obtaining your Security+ certification and are not going to attempt the exam before December 31, 2010, you may want to wait until the new version of Security+ SY0-301 is released.  CompTIA is planning the new … Continue reading

Posted in IT and Computer Security, Security Certification, Training and Education | Tagged , , , , , , | Leave a comment

Michael Gregg Demo’s how Snooping on Strangers is Made Easy with Firesheep

I blogged about sidejacking last week.  This is a common threat and one that cyber security experts have identified as a major security flaw since at least 2004. Fox News asked Michael Gregg to stop by their studio and demonstrate … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment

Firesheep Hijacking Tool Makes Hacking For Dummies a Reality

Over the years, there has been a steady progression of polished, easy to use tools that have lowered the bar for hackers. Firesheep is a good example of one such tool. Firesheep was designed to highlight how many web sites … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , | Leave a comment

Top Ten Places Cyber Criminals Go to Steal Your Identity

Are you ever uneasy about all the companies that want your social security number and other personal information?  A recent study compiled by McAfee, featured on eSecurity Planet, listed the top ten most hacked industries. While the Internet has brought … Continue reading

Posted in Hacking | Tagged , , , , , , | Leave a comment

Web Cam Hacking

While web cameras make it easy to keep in touch with friends and family it is possible for these devices to be hacked. If you have a web cam on your laptop or home computer, hackers may target these devices.  … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Wireless Vulnerabilities are a Tempting Target for Cyber Criminals and Hackers

Wireless continues to be a big security concern as it is a primary attack vector for hackers.  It is also something that needs to be closely examined during a security assessment.   Even if your not part of a ethical hacking … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Assessing Malware Found During a Network Security Assessment

If there is anything to be learned from the continued security breaches and cyber attacks that we’ve witnessed this year is that companies must have a good incident response plan in place and be prepared to deal with advanced threats … Continue reading

Posted in Ethical Hacking | Tagged , , , , , | Leave a comment

Hackers Plan to Cash in During Last Minute Rush of Tax Filing Season

While many of us may be thinking of ways to spend our tax returns, hackers are busing thinking of ways to steal our money. The possibilities are endless: Identity theft – Someone else filing your return using your social security … Continue reading

Posted in IT and Computer Security | Tagged , , , , | Leave a comment