Tag Archives: threat

Don’t Be a Victim: How to Prevent Identity Theft (Part Two of Two)

Superior Solutions provides more steps to take to prevent identity theft in this two part series Continue reading

Posted in Cyber security, IT and Computer Security, Uncategorized | Tagged , , , , , | Leave a comment

Cyber Bodyguards

The concept of cyber bodyguards may seem far-fetched, but it’s something that corporate America already has adopted.  CEO’s, business owners, and companies working through mergers, acquisitions, and IPO’s routinely use. This is one area where Hollywood has lagged behind. Celebrities … Continue reading

Posted in Ethical Hacking, Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

The Evolution of Cybercrime – Bluetooth Credit Card Skimmers

While you might not think of cyber criminals as business professionals; they face the same economic pressures as legitimate organizations.  As an example, consider the product lifecycle and how manufactured goods go through a sequence of stages from introduction, growth, … Continue reading

Posted in Ethical Hacking, Hacking | Tagged , , , , , | Leave a comment

War Texting with your Smartphone to Hack Cars

While it may seem far fetched to some, security researchers at Black Hat recently demonstrated how cars can be hacked via war texting.  Most remote control automotive systems use a cellular connection embedded in cars to provide these services.  The … Continue reading

Posted in Ethical Hacking, Hacking, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Three Years Later – Agent.btz Worm Still a Threat

Three years after a devastating breach of U.S. military networks new versions of the malware, known as agent.btz, is still considered a threat. While it’s widely believed that the Russians or Chinese may have created this worm to spy on … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment

Cyber Security Risks for Online Users

Did you know that a report by Sophos in 2009 found that a malicious web site is detected about every 5 seconds? Since then, the pace has only increased.  Internet users must implement basic protections to stay safe while surfing … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

Smart Phone Malware Continues To Spread

While Android users may have previously felt secure, attacks against these devices continue to grow.  A new Android Trojan known as Geinimi  is quickly spreading in China. Security researchers have reverse engineered the malicious code and discovered that Geinimi has … Continue reading

Posted in Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

Michael Gregg Demo’s how Snooping on Strangers is Made Easy with Firesheep

I blogged about sidejacking last week.  This is a common threat and one that cyber security experts have identified as a major security flaw since at least 2004. Fox News asked Michael Gregg to stop by their studio and demonstrate … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , , , | Leave a comment