Cyber Security

  • What is Hacking?

    During the 1990s, the term "hacker" originally denoted a skilled programmer proficient in machine code and computer operating systems. In particular, these individuals could always hack on an unsatisfactory system to solve problems and engage in a...
  • Seven Scary Things Hackers Can Do to Your Computer

    Talk about a bad day: That's how you'd feel if a hacker managed to gain access to your home computer. Yes, it may seem that hackers primarily attack large companies, but the truth is that they can also target your computer just as easily. ...
  • How a Hacker Might Exploit Your IP Address

    A hacker is simply an online vandal, if you think about it. What do vandals do but damage things that don't belong to them, for no good reason other than to do it. A hacker wants to worm his way into a network of his choosing to do serious (or not...
  • What Are Companies Doing to Beat Hackers?

    With all the recent news about hackers and huge online attacks—think of the cyber attack on Sony Corp. in late 2014—it's easy to think that hackers have the upper hand in the cyber wars. But that's not the case. One reason it seems...
  • Here's the 411 on the 419 Online Scam

    An advance-fee fraud, also known as a 419 fraud, is a type of scam in which the victim is convinced to advance money to a stranger. In all such scams, the victim is led to expect that a much larger sum of money will be returned to him or her. The ...
  • What is Phishing?

    What do you think is more likely to happen? A) Having a hacker steal your credit card information over the Internet and charging thousands of dollars on it the next day, or B) getting tricked online by a simple letter in your email box from a con ...
  • Vishing: Combining Phone and Online Fraud

    Vishing...it's indeed unusual sounding word, but there's nothing funny about it. Vishing is a phone scam in which criminals call people with a scary sounding (but untrue) story about the compromised bank accounts and the money in it. But t...
  • What is Spear-Phished!

    Here's a true and alarming story that's also unfortunately becoming a common occurrence. Anyone reading this who works with sensitive company information should take note. An executive as...
  • What is a Firewall?

    A firewall is a security device that can be a software program or a dedicated network appliance. The main purpose of a firewall is to separate a secure area from a less secure area and to control communications between the two. Firewalls can perfo...
  • The Basics of Wireless Network Security

    Most of us are so happy to have the convenience of wireless networks that we tend to overlook the fact that they are very unsecure. For example, with a wired network, you have to be directly connected to the network. But with a wireless network—wh...
  • How to Be Safe Online — In Public Places

    Most people love the convenience of going online at the local coffee shop, the airport or the hotel lobby; but most people don't know that going on the Internet in those places (called "hotspots") isn't as secure as you might think—or as safe as y...
  • Did you know you have a private IP address?

    If you were searching information on an IP address such as 192.168.1.1 or 10.0.0.1, you're on the right page. Because you're about to learn something that confuses almost anyone trying learning about IP addresses. But if you read on, you'l...
  • Types of Incidents in Cyber Security

    Types of Incidents We routinely respond to incidents that can be categorized into one of five major types: Compromised Computing Resources, which includes: System (OS) account compromises User account ...
  • XSS comprehensive Explanation

    Part One: Overview What is XSS? Cross-site scripting (XSS) is a code injection attack that allows an attacker to execute malicious JavaScript in another user's browser. The attacker...
  • How to implement whitelisting securely

    Summary Do not whitelist HTML by taking the user-provided document, removing parts of it, and returning the document. Instead, create a new document, add values to it based on the user-provided document, and return the new document. The ...
  • How to Make Your Own Penetration Testing Lab

    If you want to go into penetration testing, a home lab is a must. In this article, we’ll discuss why a home lab can be useful, the pros and cons of virtualization and the cloud for...
  • What is Ransomware?

    Ransomware is a type of malicious software (malware) that attempts to extort money from victims by restricting access to a computer system or files. The most prevalent form of this profit-motivated malware is crypto-ransomware, which...
  • What is spoofing?

    ...