Eavesdropping On Mobile Phones And Why We Need To Keep On Our Toes

Most of us in North America, Europe and much of the rest of the world trust in the confidentiality of our conversations on our mobile phones. There are still places, though, where that’s not the case. In those areas mobile phones aren’t encrypted. When we use a phone in those areas we don’t bother to […]
Read More ›

It’s Phishing Season Again (Still)

As summer has come to an end, so has the fishing season.  If you like to fish, I hope you had a good year! It’s phishing season here too. I wrote last year that It’s always phishing season, but a new crop of issues has come up and they’re good to learn about. My Facebook friends have […]
Read More ›

Examining the Financial Trade-Off to Securing your Organization

What is perfect security? Does it mean that there can be no break-ins, no stolen credentials, no lost data? Is that a good goal? One of the first things we discuss in Learning Tree Course 468, System and Network Security Introduction is the goals for organizational security. A colleague once said his company’s goal was […]
Read More ›

Training End Users to Defend Against Cyber Attacks

The title is from the refrain of a song that was popular many years ago, “Where have all the flowers gone” that was sung by Peter, Paul and Mary. I loved the folk music genre then and I still do today. The question, though, applies to cyber security and it was asked (in a wholly […]
Read More ›

The Connection Between Software Design and Software Security

Wired reported in early June of this year that there has been a bug in the popular OpenSSL for over a decade that could allow bad guys to eavesdrop on connections, including VPN connections. According to the article, the bug is mostly found in Android phones and VPN software. I hope my Android phone is […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.