Posts tagged "ethical hacking"

Types of Wireless Network Attacks

Photo Credit: Christiaan Colen via Flickr CC Our modern networks are increasingly moving towards wireless technologies. As convenient as they are, wireless connections have one major drawback – security. Compared to their wired counterparts, securing wireless technologies poses a bit of an extra challenge. My main focus for this article will be security over WiFi access, but I’ll […]

February 18, 2016 | 405ashley1952 | Views: 56345

NIST Incident Response Plan: An Overview

The National Institute of Standards and Technology (NIST) provides guidelines on what they beleive to be the best way to respond to cyber security incidents. Read on for an overview of the NIST Incident Response plan, and how it can help your organization.

January 13, 2016 | 405ashley1952 | Views: 16573

What is the Heartbleed Bug? And How Do I Protect Myself?

What is the Heartbleed Bug? The Heartbleed bug is an attack that is compromising sensitive information across the internet, including personal details and messages, financial details, user credentials, and more. The bug (Officially CVE-2014-0160) is a vulnerability in the OpenSSL Library, which provides encryption for roughly two-thirds of the websites on the internet. The bug […]

April 10, 2014 | The Intern Program | Views: 2206

Top 5 Bug Bounty Programs

Microsoft recently offered its largest bounty yet, $100,000 for the discovery of a mitigation bypass technique. The act of paying for uncovered bugs is a growing trend among social media sites and software companies who hope to uncover and solve the security problems affecting their programs before a malicious hacker exploits them. For years, bug […]

October 29, 2013 | Ashley Wheeler" class="author">Ashley Wheeler | Views: 12393