Category Archives: Uncategorized

Cyber Threats: Brute-force Cracking

cyber threats types of cyber attacks

Cyber Threats: Brute-force Cracking Brute-force cracking basically amounts to continually guessing a password until one gets it right, allowing entry to a site. It can also mean similar trial-and-error means of finding hidden pages. The most common method of brute-force attacks are dictionary attacks. A dictionary attack utilizes a password… Read more »

5 Shocking Findings from the 2015 Global Cybersecurity Status Report

In preparation for the US State of the Union address in 2015, the Information Systems Audit and Control Association (ISACA) surveyed 3,439 ISACA members for the 2015 Global Cybersecurity Status Report (read more on the report here) to gain better understanding of the largest concerns in the cybersecurity field in… Read more »

Let’s Up Your Password Game

secure passwords

Between your cloud service, e-mail account, online banks, e-commerce accounts and the rest of your internet-centric life; it sometimes impossible to be continually coming up with creative and secure passwords. Perhaps this is why people still rely on simple numerical and alphabetical passwords, but we all know better, right? Well… Read more »

CyberSecurity Headlines: Safely Discarding Hard Drives

Announcements: Cyber Security Think Tank is now CyberTraining 365! We have added a new course towards Comptia’s A+ Certification on our site. Get all of the information about the certification here There are a few key ways to safely discard a solid state drive. One way to do is to… Read more »

CyberTraining 365 is a Finalist for Best Cybersecurity Education Provider Award

We are proud to announce we have been nominated as a finalist in the category Best Cybersecurity Education Provider of the Cybersecurity Excellence Awards! As we have been fervently pursuing our mission to make cybersecurity training accessible to the masses and fill the skill gap, this is a huge step… Read more »

The FDIC Framework and the 4 Components of a Successful Cyber Security Program

The FDIC Cyber Security Framework The NIST (Institute of Standards and Technology) defines cyber security as “the process of protecting information by preventing, detecting and responding to attacks.” In 2013, the President Barack Obama issued Executive Order 13636 “Improving Critical Infrastructure Cyber Security”, delegating the development of a cyber security… Read more »

CyberSecurity Headlines: Securing Wireless Networks

The majority of devices at home and business today have wireless capabilities. There are a few options to keep your business/home wireless networks safe. PEAP and LEAP attacks are available, but pricier. Protected Extensible Authentication Protocol (PEAP), is a protocol that encapsulates the Extensible Authentication Protocol (EAP) within an encrypted… Read more »

CyberSecurity Headlines: Cracking Wireless Networks

In this video, we crack a router that speaks WEP. Wired Equivalent Privacy (WEP) is a security protocol specified in the IEEE Wireless Fidelity standard. This was the first standard developed for cybersecurity protection. Despite WEP being a bit out-dated it is not uncommon to see. However, more common encryption… Read more »

CyberSecurity Headlines: W2 Fraud

While cyber tax fraud is nothing new, as usual, there are constant new developments in methodology. Considering how slow to the times the IRS is, it’s quite easy to fall victim to these perpetrators. One new method that cyber criminals are adapting is to work in large organizations. Cyber criminals… Read more »

Friday Cyber Headlines (Video): Locky Malware, LA Hospital Ransomware, IoTs

Video Blog: In this episode I sit down with Professor Dennis Skarr to discuss the top cyber security stories of the week. Locky Malware LA Hospital Ransomware Attack Explaining IoTs (Internet of Things)