One of the top requests I get is on how to write a great resume. How long should your resume be? What should You include? What should you leave out? What is the purpose of a Resume? Resume Tips and Tricks. You can check out our past sessions and signup for new ones at: http://www.learnsecurity.org/tu #Career #Cybersecurity #Resume #TU
The Oct. 21st 2016 DDoS attack on the domain name servers of DYN has been the recent topic of many articles lately. The attack left many websites offline for several hours. What I would like to focus on here is what we can do to prevent such attacks.
First off this attack was a series of attacks that happened during the day starting at 7am Eastern time. Highly distributed, the attack involved 10s of millions ip addresses. IoT devices infected with the Mirai botnet, which has
This time of year is sweet for hackers; IT folk are off, you’re on break and perfect targets for malware infestation and ID theft.
Even better, many email systems don’t filter bad emails very well. They can pass through or retain many bad emails in quarantine, especially on weekends or breaks, and if one looks good and fools you into even just looking at it, you’re up the creek.
These links are a small demonstration of a simple script in a web page, like the
Ernest Cline’s “Ready Player One” is a book filled with references to video games, virtual reality, ’80s pop-culture trivia, geek heroes like E. Gary Gygax, and funny-sounding cult items like Frobozz and Raaka-Tu. They are interested in that time period because of a billionaire inventor, James Halliday, died and left behind a mischievous legacy. Whoever first cracks Halliday’s series of ’80s-related riddles, clues, and puzzles that are explained in a film called “Anorak’s Inv
NIST is Proud to Announce the Release of Special Publication 800-179, Guide to Securing Apple OS X 10.10 Systems for IT Professionals: A NIST Security Configuration Checklist. This Special Publication has been approved as final.
Link to the Announcement of this SP’s release (CSRC News page):
Link to Special Publication 800-179 (PDF format) from the NIST Library website:
The more and more items we add to the IoT (Internet of Things) the more and more security hacks you should expect to find. You have companies that are not necessarily IT technology companies adding IT to their items. Coupled with insecure coding practices, we should see more and more hacks. #IoT #Internet #InternetofThings #Hack #Hacking #Cybersecurity #Vulnerability
A new level of danger. In Vehicle Informant (IVI Computers) are being hacked with deadly results. “Two hackers have developed a tool that can hijack a Jeep over the internet. WIRED senior writer Andy Greenberg takes the SUV for a spin on the highway while the hackers attack it from miles away.” - Wired #IVI #Vulnerability #Hacking #Hack #Cybersecurity
I found this story interesting because it was about an internal IT employee. For supporting the company employees, he was given the passwords and network credentials for them. This would allow him to remotely access their computers to address technology issues. With that access, he started to read the emails of the CFO and others to learn about business deals before they became public. With the information, he was able to make a profit with the stocks that he purchased. In t