Should I Become a Certified Ethical Hacker?

For National Cyber Security Awareness Month, we are resharing some of our most popular cyber security blogs from the past year to ensure you are staying #CyberAware online – whether at home or in the office. Maybe you’ve heard a little about the Certified Ethical Hacker or CEH exam. You probably have some questions: What […]
Read More ›

Exploring Exploits

In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit?  Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Read More ›

Exploit vs. Antivirus: It’s No Contest

In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around.  The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database.  You might be thinking that you are still safe, as you have antivirus.  Let’s find out how well it protects you. As of […]
Read More ›

Bypassing User Activation Controls

My last blog about User Activation Controls suggested that they were of little help, even when they work.  After all, user data (your documents, spreadsheets and such) are the most valuable things you have.  Now, we’ll just trash UAC by bypassing it.  We’ll do this by relying on a flaw:  Microsoft loves itself. Remember, UAC […]
Read More ›

This Java Threat Is Really Confusing

For several months, there were rumblings in the hacker underground about some serious threats to Java and Apple’s OS X.  ComputerWorld reported in late February 2012 that a new variant of an exploit called Flashback was making its rounds of Macs by using the browser and Java to get in.  CNN followed by reporting that […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.