Category Archives: Department of Defence

Hacking History: The 414s

the 414s

Hacking History: The 414s The 80’s Hacker Craze In the early 1980’s the internet and home-computer were relatively new and had yet to be accounted for, in the United States legal system. Innovation and progress moved faster than the bureaucratic system could keep up with, let alone predict. In 1983… Read more »

#CyberHeadlines: Cloudflare’s CloudBleed

#CyberHeadlines

CloudBleed, the Cloudflare Vulnerability In late February, Tavis Ormandy, Google security researcher, contacted Cloudflare, the web performance and security company, about a memory leak happening in their system due to a parser bug. Many companies, such as Salesforce, Uber and OK Cupid, use Cloudflare who touts Performance, Security Reliability and… Read more »

#CyberHeadlines: 1st Practical SHA-1 Collision Attack

#CyberHeadlines

The 1st Practical SHA-1 Collision Attack Researchers from Google, the Cryptology Group at Centrum Wiskunde and Informatica in Amsterdam, published a paper last week about the first practical collision attack for the cryptographic hash function SHA-1. The attack method entails the collision of two PDF files by obtaining the SHA-1 signature… Read more »

#CyberHeadlines: AWS Outage, Dridex Update, Boeing Faux-Pas

#CyberHeadlines

AWS Outage, Dridex Update, Boeing Faux-Pas A lot of big cyber security news happened at the end of February, here are some of the biggest stories, we thought you need to know about. Amazon Web Services Outage February 28th, Amazon’s oldest AWS server had an outage, taking many sites down… Read more »

How to become a Network Security Administrator

how to become a network security administration

How to Become a Network Security Administrator Browse our course library and get your career path started today! What is a Network Security Administrator? The Network Security Administrator (or Systems Administrator) is a jack-of-all-trades in the security sector. Ultimately, it’s the Network Security Administrator’s job to keep an organization’s network… Read more »

Hacking History: The Chaos Computer Club (CCC)

Chaos Computer Club

Hacking History: The Chaos Computer Club (CCC) The Chaos Computer Club (CCC) is the oldest hacking group (I would even say, oldest hacktivist group) known in history, but also brings us all the way to 1981. Before we go into the CCC’s history, let’s do a little catch up to… Read more »

The Essentials: The ABC’s of Cyber Security

essential cyber security

Essential Cyber Security Terminology Now that cyber security is increasingly in the spotlight, and top-of mind for individuals and businesses, it’s important to know essential cyber security terms to help you navigate the conversations. We have compiled our ABC’s of Cyber Security to provide you this short glossary of terms,… Read more »

How to become a Security Architect

How to become a Security Architect

How to become a Security Architect Browse our course library and get your career path started today! What is a Security Architect? A Security Architect’s main objective is to develop and test security tools and infrastructure in order to protect an organization’s network and systems. Security Architects need to be… Read more »

Hacking History: Rene Carmille

Rene Carmille and Nazi punch cards

Hacking History: Rene Carmille Moving away from Poland and England, there are still historical hackers to be found throughout WWII. One of the greatest heroes of the war was Rene Carmille, French Army General Comptroller. Rene Carmille is often also credited as “the first hacker” for his work, defying the… Read more »

How to become a Penetration Tester

penetration tester

How to become a Penetration Tester Browse our course library and get your career path started today! What is an Penetration Tester? At the heart of it, a Penetration Tester is someone who performs penetration tests on an organization’s networks, systems, apps, etc. to find vulnerabilities for the organization to… Read more »