Category Archives: NSA

Hacking History: Clifford Stoll and Operation Showerhead

Clifford Stoll

Hacking History: Clifford Stoll and Operation Showerhead- the first Honey Pot In 1986, an astronomer named Clifford Stoll, had is grant cut and started a new job in the Lawrence Berkeley Laboratory (LBL), as a systems manager. Near the beginning of his new role, his boss asked him to investigate… Read more »

Who’s responsible for the Cyber Security of your Company?

responsible for cyber security

Who’s responsible for the Cyber Security of your Company? Many companies hold IT solely responsible for online information privacy and security, but experts agree that this is not a sustainable security business model. In an interview with the Wall Street Journal, Former CIA and NSA Director, Gen. Michael Hayden, calls… Read more »

WannaCry Ransomware Roundup

WannaCry ransomware

WannaCry Ransomware Roundup On May 12, 2017, a new ransomware strain, deemed “WannaCry” (WannaCrypt), was found by Malwarebytes (an anti-malware software company). Programmed to run in 27 languages, the ransomware’s first major infection, which grabbed all our attention, was when it hit the National Health Service of Britain (NHS). British… Read more »

Hacking History: The Morris Worm and Robert T. Morris Jr.

the Morris worm

Hacking History: Robert Tappan Morris Jr. Up to this point in our hacking history series, the figures have focused on decryption and then manual processes to intercept communications or gather information from other people’s systems. In this next installment of our series, the potential of hacking into networks and computers… Read more »

#CyberHeadlines: When your VPN is out to get you

#CyberHeadlines: When your VPN is out to get you Nicholas Deleon, writer at Motherboard, posted an article last week about a cyber fraud that targeted him recently. The story is perplexing, and comically written, and is a fun read (I recommend it). Deleon’s speculative reasoning suggests that new legislation allowing… Read more »

#CyberHeadlines: Sophisticated Cyber Bank Thievery

#CyberHeadlines: Sophisticated Cyber Bank Thievery Last week, Kaspersky uncovered the first known case of “wholesale bank fraud”. Targeting 36 Brazilian banking sites last year, hackers changed the DNS (Domain Name System) registrations, controlling the bank’s website domains to direct users to phishing sites. It is believed that at the same… Read more »

Train-Up or Hire-In? The Pros and Cons of IT Security Training

training or hiring

Train-Up or Hire-In? The Pros and Cons of IT Security Training Whether you’ve been hit with an attack, or are just seeing all the breaches happening in the news daily, you may be concerned that your security tools are just not going to cut it anymore. Along with data security… Read more »

How to become a CISO

CISO

How to become a CISO Browse our course library and get your career path started today! What is a CISO? CISO stands for Chief Information Security Officer. The CISO is part of a company’s C-suite, or senior-level executive board. CISOs are expected to focus on the maturity level of the… Read more »

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War]

Legion of Doom Masters of Deception

Hacking History: LOD vs. MOD Part 2 [The Hacker Gang War] Last week, I started the story of two of the most infamous hacker gangs of the 1980’s: the Legion of Doom and the Masters of Deception. The second part of this story gets a bit more ambiguous, considering the… Read more »

The Big Cyber Threats Breakdown: Types of Cyber Attacks

cyber threats types of cyber attacks

The Big Cyber Threats Breakdown: Types of Cyber Attacks Last year, I published a series breaking down various cyber threats: how they work, infamous case studies and how to defend yourself against them. In this post, I have compiled the entire list amounting to nine types of cyber-attacks. I’ve added… Read more »