Internet Crime Help From Uncle Sam

One of the more interesting places to get information about crime on the Internet is the Internet Crime Complaint Center at www.ic3.gov. According to their site  the IC3 “was established as a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C) to serve as a means to receive […]
Read More ›

Will My Cloud Provider Read My Data?

In my last blog post, I explained how you can verify that Amazon cloud storage is zeroized before being redeployed for the next user. But what about the cloud provider browsing through your data? After all, it’s stored on their hardware in their facility, so they have physical access plus the ability to interact with […]
Read More ›

Social Engineering on Father’s Day

Social engineering is a powerful tool. But, it is tough art to practice.  It’s fun and interesting to read about it.  But, what if you wanted to experience first-hand how it works?  You can’t just waltz into some establishment and run a con game.  Sending phishing or spearphishing emails to friends will not endear you […]
Read More ›

Security Topics on Lifehacker

I like to read. I also like to read about how to get things done better. I therefore read the blog lifehacker.com. Their About page describes the blog as “Tips, tricks, and downloads for getting things done.” The topics range from food, to offices, to computer topics including security. The latter is why I’m talking […]
Read More ›

Exploring Exploits

In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit?  Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.