Posts tagged "ethical hacking"

Types of Wireless Network Attacks

Photo Credit: Christiaan Colen via Flickr CC Our modern networks are increasingly moving towards wireless technologies. As convenient as they are, wireless connections have one major drawback – security. Compared to their wired counterparts, securing wireless technologies poses a bit of an extra challenge. My main focus for this article will be security over WiFi access, but I’ll […]

February 18, 2016 | 405ashley1952 | Views: 51165

NIST Incident Response Plan: An Overview

The National Institute of Standards and Technology (NIST) provides guidelines on what they beleive to be the best way to respond to cyber security incidents. Read on for an overview of the NIST Incident Response plan, and how it can help your organization.

January 13, 2016 | 405ashley1952 | Views: 14542

What is the Heartbleed Bug? And How Do I Protect Myself?

What is the Heartbleed Bug? The Heartbleed bug is an attack that is compromising sensitive information across the internet, including personal details and messages, financial details, user credentials, and more. The bug (Officially CVE-2014-0160) is a vulnerability in the OpenSSL Library, which provides encryption for roughly two-thirds of the websites on the internet. The bug […]

April 10, 2014 | The Intern Program | Views: 2065

Why Do We Need More Certified Ethical Hackers?

Unethical hacking and cyber crime occurs at a personal and corporate level. Companies require digital allies to combat the data breaches and intrusions. Not one company or person is completely 100% bulletproof against unethical hackers. Even if you’re a seasoned ethical hacker and cyber security pro, daily interactions, social media usage, and other factors take […]

March 5, 2014 | The Intern Program | Views: 5808

Top 5 Bug Bounty Programs

Microsoft recently offered its largest bounty yet, $100,000 for the discovery of a mitigation bypass technique. The act of paying for uncovered bugs is a growing trend among social media sites and software companies who hope to uncover and solve the security problems affecting their programs before a malicious hacker exploits them. For years, bug […]

October 29, 2013 | Ashley Wheeler" class="author">Ashley Wheeler | Views: 11749