Social Engineering on Father’s Day

Social engineering is a powerful tool. But, it is tough art to practice.  It’s fun and interesting to read about it.  But, what if you wanted to experience first-hand how it works?  You can’t just waltz into some establishment and run a con game.  Sending phishing or spearphishing emails to friends will not endear you […]
Read More ›

Security Topics on Lifehacker

I like to read. I also like to read about how to get things done better. I therefore read the blog lifehacker.com. Their About page describes the blog as “Tips, tricks, and downloads for getting things done.” The topics range from food, to offices, to computer topics including security. The latter is why I’m talking […]
Read More ›

Exploring Exploits

In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit?  Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Read More ›

Who Can Read My Data in the Cloud?

For the sake of your compliance, you hope that the answer is “nobody”! For most organizations, confidentiality is the greatest concern. The most worrying thing about using cloud technology is storing your data on someone else’s hardware. But how big of a risk is this, really? Stored data should be encrypted. However, how much of […]
Read More ›

Exploit vs. Antivirus: It’s No Contest

In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around.  The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database.  You might be thinking that you are still safe, as you have antivirus.  Let’s find out how well it protects you. As of […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.