

Book Reviews Q1 2018
My recent reading list has included a number of good titles that may in some way relate to cybersecurity. I freely admit that I am in...


College Day RSA Conference
DON’T MISS OUT ON RSAC COLLEGE DAY College students and recent grads are invited to one FREE day of Full Conference access on April 19 ...


12 DEC 2017 Security Update
In this issue will will cover recent news topics in cyber security. #Security #Antimalware #Malware #Hacker #Hacking #Cybercrime...


Hacking Cars, Plans, and Devices
How safe are we? If planes can be hacked and cars can be hacked, what is preventing terrorists or contract killers from hacking vehicles...


Cyber-espionage Technology Ups the Game
Espionage is nothing new, with the advent of technology why wouldn’t spies take full advantage of the benefits and ease of use technology...


Student Notes November 2017
Don, Since we'd been talking about AI recently in the beginning of class before we get down to the lesson of the day, thought you'd might...


Where Cybercrime Goes to Hide
Here is a Norton documentary on bulletproof hosting services. Pick where you want to host your data where it is most legally beneficial...


The Wolf
Stop what you are doing and watch this. It's a big ad for HP but you gotta take a minute to view it. Especially after what we were...


Hackers Steal Celebrity Plastic Surgery Photos
Hackers Steal Celebrity Plastic Surgery Photos, Demand Ransom (The Young Turks) Hackers are demanding big money to not release plastic...


Spoofing Fully Qualified Domain Names
Spoofing Fully Qualified Domain Names How can you spoof a FQDN? John Hohn covers the history of DNS and name registry to demonstrate a...