Security

Ways to Protect Yourself if Using Public Wi-Fi Networks

2017-03-28T20:26:19-07:00

Nowadays you find Wi-Fi networks you can access easily everywhere... in coffee shops, restaurants and hotels, shopping malls, even out in the open street in major city centres.This is great. It means that you can go online from your mobile phone, smartphone, tablet or laptop, indeed any portable device, in most places at any time [...]

Ways to Protect Yourself if Using Public Wi-Fi Networks2017-03-28T20:26:19-07:00

The 12 Worst Viruses In History

2017-03-28T20:24:36-07:00

Just to remind people after all the hacking going on this last few months [of which I was affected by the OPM identity theft] that we had quite a few viruses in a not so distant past...MORRIS - November 2, 1988This was one of the first worms to be ever distributed on the Internet. Several [...]

The 12 Worst Viruses In History2017-03-28T20:24:36-07:00

MEGAMIND adds CCFP Exam Prep & InfoSec Metrics Courses

2017-09-18T20:51:06-07:00

MEGAMIND® Training Institute We're here to help you successfully prepare for the CISM®, CISA®, CRISC®, CCFP®, CISSP® exams ================================================ Megamind is pleased to announce the following new classes: New! CCFP (Certified Cyber Forensics Professional) PREP EXAM LIVE Online Training w/Ali Dehghantanha Ph.D, CCFP, CISSP, CISM, CEH, CHFI, LPT Cyber Security Expert and Forensics Researcher [...]

MEGAMIND adds CCFP Exam Prep & InfoSec Metrics Courses2017-09-18T20:51:06-07:00

Beware of Phishing Scams!

2017-03-28T20:46:11-07:00

Beware! We are dealing with very TARGETED email scams, or PHISHING. When the economy is tough and more people are looking for jobs, phishers are having a field day... but many are getting caught TOO! Some Phishers who wasted a retired woman's 1.5 million life savings on cheeseburgers, champagne and gold are now facing jail [...]

Beware of Phishing Scams!2017-03-28T20:46:11-07:00

Hacking: Is The Security Summer Over Yet?

2017-03-28T20:29:21-07:00

Compromise, Compromises, Wow, Summer has brought a lot of security headaches! Well, the entire August and the beginning of September have been very busy for the security community! A hacking ring had pilfered 1.2 billion user name and password combinations and more than 500 million email addresses. What should you do? 1. Change your passwords. [...]

Hacking: Is The Security Summer Over Yet?2017-03-28T20:29:21-07:00

HeartBleed, a Serious OpenSSL vulnerability

2017-03-28T20:35:30-07:00

Unless you were hiding under a rock, you are probably aware that a major security flaw was discovered about a month ago, but had been existent for over 2 years. The implications are that during that time, many skilled malicious people from all over the world, could have been using secure keys to bypass [...]

HeartBleed, a Serious OpenSSL vulnerability2017-03-28T20:35:30-07:00

WiFi Everywhere: the Perfect Storm for Insecurity!

2017-03-28T20:34:47-07:00

The year is 2014, a period in which we would seem to be fully dependent on wifi-everywhere, and technology to support our businesses, and personal commitments. 2014 is also a period in which society is fully engaged with technology, to conduct their online banking, to embrace the sales on Black Friday, or to simply [...]

WiFi Everywhere: the Perfect Storm for Insecurity!2017-03-28T20:34:47-07:00

Retail Giant: Target & Luxury Retailer: Neiman Marcus Customers Breached: Affects 110+ Millions!

2017-03-28T20:37:41-07:00

Well, it looks like not only the holiday shoppers received presents last month... Target was breached TWICE: Target's breach affects millions who shopped at their stores: "Approximately 40 million credit and debit card accounts may have been impacted between Nov. 27 and Dec. 15, 2013," Personal info of 70 million Target customers compromised: stolen [...]

Retail Giant: Target & Luxury Retailer: Neiman Marcus Customers Breached: Affects 110+ Millions!2017-03-28T20:37:41-07:00

CISM vs. CISSP: What’s the true value?

2018-04-03T08:36:40-07:00

CISM® vs. CISSP® Understanding the Differences and their True Value There is a lot to know about the differences between the Certified Information Security Manager (CISM®)and the Certified Information Systems Security Professional (CISSP®). I have a unique perspective regarding skills and credentials for the successful IT professional.  With a background in HR and IT Training, I've [...]

CISM vs. CISSP: What’s the true value?2018-04-03T08:36:40-07:00

You’ve Been Hacked! How to react.

2017-03-28T20:42:03-07:00

In this second part of our hacking series post we will learn WHAT TO DO NEXT when a cyber or information security incident occurs. Usually all these steps should be well documented in an Information Security Policy or an Incident Response Policy.The Carnegie Mellon University And Software Engineering Institute provides many free and detailed guides (they are [...]

You’ve Been Hacked! How to react.2017-03-28T20:42:03-07:00
Go to Top