Category: Uncategorized
CompTIA Advance Security Practitioner Certification
What is the CompTIA Advanced Security Practitioner Certification and how does it compare to the other certification available? CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing. The CASP+ is […]
T-Mobile Hacked!
T-Mobile Hacked — 2 Million Customers’ Personal Data Stolen T-Mobile confirmed that the telecom giant suffered a massive security breach on its US servers on August 20 that may have resulted in the leak of “some” personal information of up to 2 million T-Mobile customers. Though no […]
ARE ALL HACKERS CREATED EQUALLY?
The few hackers that no one really talks about First, let’s explain what a hacker is; a hacker is anyone who exploits a weakness in order to gain unauthorized access. When people think of the word ‘hacker’ they may think of someone in dark clothing […]
The House passes a bill to protect our industries from cyberattacks
The House lawmakers have finally approved cybersecurity legislation on Monday. This bill will secure the technologies used to protect critical infrastructure from any type of cyberattacks. The bill will still need to get approved by the Senate before being signed into law by the President.
How to disappear from the Internet
Are you tired of watching the news and seeing the latest privacy breach within your favorite social media sites? Are you tired of organizations mishandling of the data that you entrusted with them? Do you want to disappear from the Internet? Do you want to […]
MysteryBot Android trojan aims at banking apps
A new triple threat malware has arisen and is plaguing Android devices. This malware can place an overlay screen on top of your login screen and steal your login information.The malware is flawless in its attempts to masquerade as an legitimate app.
Adidas phishing campaign promises free shoes, offers $50 subscription instead
An Adidas phishing campaign is offering potential victims a “free” $50 per month subscription via all under the promise of free shoes Adidas has fallen victim to the latest phishing attempt. This campaign promises that their victims will receive free shoes and money. The construction of […]
Cybersecurity versus Information Security
Information and cybersecurity is very similar as they are both designed to protect the organizational security posture. Do you know the difference in the two?
CYBERSECURITY CHEAT SHEET
CYBERSECURITY ATTACK CHEAT SHEET Cybersecurity is a very hot topic in the news; however, some of the terms that are being thrown around may go over some people’s head. Here is an overview of the top 5 common terminologies that everyone should know.
A Google program can pass as a human on the phone. Should it be required to tell people it’s a machine?
Google’s new AI can carry on phone conversations that are so lifelike that even a human listener can be fooled.