Are Dark Web Scans Effective?

The Dark Web is Anonymous The dark web is a scary place.  It is a network of websites teaming with illegal activity.  It is an...

PMP vs CISSP

How does the PMP exam compare to the CISSP exam? When someone asked me that question I thought it was rather odd.  How can you...

Don’t Underestimate the CompTia Security+ Exam

The Security+ exam isn't that easy! I was recently at a family reunion and I was talking to my cousin who does IT work for...

Why Hardware Encryption is Not Secure

A Little History In the past it was assumed that hardware encryption is far more secure than software encryption.  Many people, including security experts, still...

Murder by Hacking

When Hackers Kill Hackers have already - perhaps many times- have contributed to death by hacking into secure systems and releasing information.  This information has...

What is Zerodium?

Zerodium is a reputable place where you can sell zero day exploits. Hackers and security researchers know that Zerodium is a way to cash in...

What is Persian Stalker?

Persian Stalker is targeting Iranian social media accounts. The "group" has been around since 2017 and they have been observed targeting social media accounts.  Specifically,...

How I passed the CISSP exam without reading any books

Reading is not my learning style. In today's world of podcasts and audio books I believe that less and less people are accustomed to learning...

Phishing attacks up by 300% in 2018

According to "The Retail and eCommerce Threat Landscape Report" from October 2018 there is a 297% increase  in the number of phishing websites that...

More data shows that Americans are lackadaisical about security.

A new research report Published by cybersecurity specialists, BestVPN.com, shows the state of online privacy in the United States. BestVPN surveyed 1,000 U.S. consumers...

North Korean Cryptocurrency Scam Efforts – Marine Chain

Experts think that the infamous North Korean hacker group Lazarus accounts for targeted strikes against five cryptocurrency exchanges. North Korea's burgeoning cyber military seems to...

The freeRTOS Vulnerability Disaster

FreeRTOS, the open-source operating system that powers most of the small microprocessors and microcontrollers in many IOT hardware products has newly identified vulnerabilities. The vulnerabilities...

City of Westhaven Connecticut Pays $2K in Ransomware Extortion

Another successful ransomware attack.... The City of West Haven, Connecticut made the tough decision to pay hackers $2,000 in ransom money after a ransomware attack...

Hackers are Unstoppable?

According to research by Kaspersky Lab, 86% of Cybersecurity professionals think that hackers are not stoppable and will eventually succeed at compromising the systems...

The Most Frequent Kinds of Malware

Malware is short for "Malicious Software" and has been around for a very long time.  Way back in the 1980s trojans and other types...

What is Coinhive Malware?

A cryptocurrency mining code called Coinhive is creeping onto unsuspecting websites around the net. Coinhive uses javascript to harness computer users CPU capacity when they...

The Bloomberg article about Supermicro Supply Chain Hardware Hack

Everyone is talking about the Bloomberg Businessweek's volatile report alleging that Chinese spies had implanted surveillance chips in the motherboards of computer servers. The report...