

Resume Advice for IT & Cybersecurity
One of the top requests I get is on how to write a great resume. How long should your resume be? What should You include? What should you leave out? What is the purpose of a Resume? Resume Tips and Tricks. You can check out our past sessions and signup for new ones at: http://www.learnsecurity.org/tu #Career #Cybersecurity #Resume #TU


Dangers of IoT
The Oct. 21st 2016 DDoS attack on the domain name servers of DYN has been the recent topic of many articles lately. The attack left many websites offline for several hours. What I would like to focus on here is what we can do to prevent such attacks.
First off this attack was a series of attacks that happened during the day starting at 7am Eastern time. Highly distributed, the attack involved 10s of millions ip addresses. IoT devices infected with the Mirai botnet, which has


5 Most Dangerous Hackers Of All Time
Here are 5 of the most dangerous hackers to ever walk the streets of the Internet. #Hack #Hacking #Cybersecurity #Vulnerability #SocialEngineering


Resume Tips from David Hay
Resume Tips 2016 (Updated) - Your resume sucks now let me show you how to fix it #Career #Resume


Have a Cyber Safe and Aware Holiday
Greetings -
This time of year is sweet for hackers; IT folk are off, you’re on break and perfect targets for malware infestation and ID theft.
Even better, many email systems don’t filter bad emails very well. They can pass through or retain many bad emails in quarantine, especially on weekends or breaks, and if one looks good and fools you into even just looking at it, you’re up the creek.
These links are a small demonstration of a simple script in a web page, like the


Book Review: Ready Player One
Ernest Cline’s “Ready Player One” is a book filled with references to video games, virtual reality, ’80s pop-culture trivia, geek heroes like E. Gary Gygax, and funny-sounding cult items like Frobozz and Raaka-Tu. They are interested in that time period because of a billionaire inventor, James Halliday, died and left behind a mischievous legacy. Whoever first cracks Halliday’s series of ’80s-related riddles, clues, and puzzles that are explained in a film called “Anorak’s Inv

Securing Apple OS X 10.10 (NIST)
NIST is Proud to Announce the Release of Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist. This Special Publication has been approved as final.
Link to the Announcement of this SP’s release (CSRC News page):
<http://csrc.nist.gov/news_events/#dec12>
Link to Special Publication 800-179 (PDF format) from the NIST Library website:
<http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIS


Hacking the Coffee Pot
The more and more items we add to the IoT (Internet of Things) the more and more security hacks you should expect to find. You have companies that are not necessarily IT technology companies adding IT to their items. Coupled with insecure coding practices, we should see more and more hacks. #IoT #Internet #InternetofThings #Hack #Hacking #Cybersecurity #Vulnerability


Hacking Car Computers
A new level of danger. In Vehicle Informant (IVI Computers) are being hacked with deadly results. “Two hackers have developed a tool that can hijack a Jeep over the internet. WIRED senior writer Andy Greenberg takes the SUV for a spin on the highway while the hackers attack it from miles away.” - Wired #IVI #Vulnerability #Hacking #Hack #Cybersecurity


Internal IT, The Risks
I found this story interesting because it was about an internal IT employee. For supporting the company employees, he was given the passwords and network credentials for them. This would allow him to remotely access their computers to address technology issues. With that access, he started to read the emails of the CFO and others to learn about business deals before they became public. With the information, he was able to make a profit with the stocks that he purchased. In t