Tag Archives: rogueware

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Research Shows Businesses are Prime Targets for Cybercrime

High profile security breaches such as Target, Snapchat, and Neiman Marcus often make headlines. However, research shows that both large and small businesses are targets of cybercrime. Verizon published a data breach investigations report that looked at 621 confirmed incidents … Continue reading

Posted in Cyber security, Hacking, IT and Computer Security, Training and Education | Tagged , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

Cyber Security Risks for Online Users

Did you know that a report by Sophos in 2009 found that a malicious web site is detected about every 5 seconds? Since then, the pace has only increased.  Internet users must implement basic protections to stay safe while surfing … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment