Category: Information Security
What is the CompTIA Advanced Security Practitioner Certification and how does it compare to the other certification available? CompTIA Advanced Security Practitioner (CASP+) is the ideal certification for technical professionals who wish to remain immersed in technology as opposed to strictly managing. The CASP+ is […]
The few hackers that no one really talks about First, let’s explain what a hacker is; a hacker is anyone who exploits a weakness in order to gain unauthorized access. When people think of the word ‘hacker’ they may think of someone in dark clothing […]
The House lawmakers have finally approved cybersecurity legislation on Monday. This bill will secure the technologies used to protect critical infrastructure from any type of cyberattacks. The bill will still need to get approved by the Senate before being signed into law by the President.
Procrastination is a formidable adversary with a friendly face…and it is time to fight back! Procrastination is both relentless and restless in its efforts of domination and control. This lifelong foe is in a constant state of war with personal advancement and growth. The casualty […]
A new triple threat malware has arisen and is plaguing Android devices. This malware can place an overlay screen on top of your login screen and steal your login information.The malware is flawless in its attempts to masquerade as an legitimate app.
An Adidas phishing campaign is offering potential victims a “free” $50 per month subscription via all under the promise of free shoes Adidas has fallen victim to the latest phishing attempt. This campaign promises that their victims will receive free shoes and money. The construction of […]
The greatest testament to a cybersecurity professional is when a university asks you to teach their future cybersecurity professionals. I am extremely excited about this new opportunity. I look forward to sharing my knowledge and work experience with the next generation of future professionals. THE […]
CYBERSECURITY ATTACK CHEAT SHEET Cybersecurity is a very hot topic in the news; however, some of the terms that are being thrown around may go over some people’s head. Here is an overview of the top 5 common terminologies that everyone should know.
A Google program can pass as a human on the phone. Should it be required to tell people it’s a machine?
Google’s new AI can carry on phone conversations that are so lifelike that even a human listener can be fooled.