Tag Archives: Trojan

Credit Card Hacking: 10 Things You Should Know About Smart Cards

The United States likes to think of itself as a technology leader yet has not adopted smarts cards as a replacement for magnetic strip credit cards. Smart cards are easy to identify because of the small electronic chip found on … Continue reading

Posted in Cyber security, Ethical Hacking, IT and Computer Security | Tagged , , , , , , , , , , | Leave a comment

To Prevent Cyber Hacks Should the U.S. adopt a “No Made-in-China” Policy for Chinese Made Telecom Equipment

Earlier this year, Information Age reported that Cambridge University researchers discovered that a microprocessor used by the U.S. military (made in China) contains secret remote access capability (a “backdoor”) which means that it can be reprogrammed or shutdown without the … Continue reading

Posted in Ethical Hacking, Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , , | Leave a comment

The Threat of Apple Malware – Does Your Mac Need Protection?

For many years Apple users have not worried about malware to the extent Microsoft Windows users have.  Has the immunity to malware finally come to an end? Some might say yes, while others disagree. Apple computers no longer hold the … Continue reading

Posted in Hacking, Smart Phone Hacking, Training and Education | Tagged , , , , , , , , , | Leave a comment

One Congressman, One Tweet, Big Problems

Hacking social network sites is nothing new, yet political junkies have been Tweeting over an odd story about New York Congressman Anthony Weiner. It goes something like this: Over the weekend, Weiner’s Twitter account posted a photo addressed to a young … Continue reading

Posted in Hacking, IT and Computer Security | Tagged , , , , , | Leave a comment

Smart Phone Malware Continues To Spread

While Android users may have previously felt secure, attacks against these devices continue to grow.  A new Android Trojan known as Geinimi  is quickly spreading in China. Security researchers have reverse engineered the malicious code and discovered that Geinimi has … Continue reading

Posted in Hacking, IT and Computer Security, Smart Phone Hacking | Tagged , , , , , , | Leave a comment

How Effective Study Skills can help you Achieve your CISSP Certification

Since not everyone studies in the same manner, what works for one person may not work for someone else.  If you are looking to obtain your CISSP, CISA, CISM CEH, or really any IT security certification you will need to … Continue reading

Posted in Security Certification, Training and Education | Tagged , , , | Leave a comment

Web Cam Hacking

While web cameras make it easy to keep in touch with friends and family it is possible for these devices to be hacked. If you have a web cam on your laptop or home computer, hackers may target these devices.  … Continue reading

Posted in Ethical Hacking | Tagged , , , , | Leave a comment

Assessing Malware Found During a Network Security Assessment

If there is anything to be learned from the continued security breaches and cyber attacks that we’ve witnessed this year is that companies must have a good incident response plan in place and be prepared to deal with advanced threats … Continue reading

Posted in Ethical Hacking | Tagged , , , , , | Leave a comment

Are You Getting a Charge Out of Hacking?

You may be getting a charge out of hacking if you are using the Energizer DUO USB Battery Charger.  This battery charger comes with software to allow Windows users to monitor the status of the batteries while they are charging.  … Continue reading

Posted in Ethical Hacking | Tagged | Leave a comment