Tag Archives: Training

Tax Scams – Three Ways Hackers Plan to Steal Your Tax Return in 2017

Experts warn that there are several fraudulent tax scams as this year’s tax season begins. Taxpayer data is vulnerable and hackers are using several different techniques in 2017 to target your tax return. Three ways hackers can cash-out on unsuspecting … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , , , , , , , | Leave a comment

Is Windows 10 Spying On You or Simply Building a Better User Experience?

Microsoft has come under fire from privacy advocates because many end-users feel that Window 10 is way too intrusive.  While it is true that much of this data is used to enhance user experience, Microsoft’s lack of transparency isn’t doing … Continue reading

Posted in Hacking, IT and Computer Security, rogueware | Tagged , , , , , , , , | Leave a comment

The CISSP Exam Update and Eight Domain Rewrite for 2015

For individuals considering the (ISC)² CISSP exam, you need to be aware of a major update that will go into effect April 1, 2015.  Gone are the ten domains that have been with us for many years. Here are the … Continue reading

Posted in Cyber security, IT and Computer Security, Training and Education | Tagged , , , | Leave a comment

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

Businesses Must Be Proactive With Cyber Security Policies

Security breaches and intrusions have been in the spotlight as businesses across several sectors have reported damaging intrusions into their networks. Many of these have resulted in the theft of consumer personal data, or even worse, sensitive government information. Unfortunately, … Continue reading

Posted in Cyber security, Ethical Hacking, Training and Education | Tagged , , , | Leave a comment

Advanced Cyber Training – CompTIA CASP

It is critical that companies take good care of their digital assets and keep them well protected from the cyber criminals. Cyber security requires special attention and care. The advantages of a company being on the Internet are many, yet … Continue reading

Posted in IT and Computer Security, Security Certification | Tagged , , , , , | Leave a comment

SSCP Certification to be Updated in 2012

The CISSP exam is not the only ISC2 exam due to be updated in 2012.  The SSCP certification will also undergo some changes.  Some topics have changed.  The 2012 SSCP 2012 domains are: Access Controls Security Operations and Administration Monitoring … Continue reading

Posted in Ethical Hacking, Training and Education | Tagged , , , , , , | Leave a comment

CompTIA CASP Certification Training

The CASP exam has gone live and is now available for those interested in the certification.  I would rate this as a somewhat difficult test.  CompTIA is looking for ten years experience in network administration including at least five years … Continue reading

Posted in IT and Computer Security, Security Certification, Uncategorized | Tagged , , , , , , , , , | Leave a comment

ISC2 to Update the CISSP Certification in 2012

If you have been working toward your CISSP certification you will want to note that the CISSP exam will be revised on January 1st 2012 and the SSCP exam will be revised February 1st 2012.  There will still be ten domains but … Continue reading

Posted in IT and Computer Security, Security Certification | Tagged , , , | Leave a comment

Is Ethical Hacking Legal

While ethical hacking is widely seen as a useful technique to test the security controls of an approving company or client, some in Australia disagree.   Police there have spoken out strongly against ethical hacking in the wake of some of … Continue reading

Posted in Ethical Hacking, Security Certification | Tagged , , , , , , | Leave a comment