Should I Become a Certified Ethical Hacker?
Apr 25,
2018
For National Cyber Security Awareness Month, we are resharing some of our most popular cyber security blogs from the past year to ensure you are staying #CyberAware online – whether at home or in the office. Maybe you’ve heard a little about the Certified Ethical Hacker or CEH exam. You probably have some questions: What […]
Exploring Exploits
Jun 12,
2012
In security testing, studying and deploying exploits seems to be the most fun. Exploits provoke the most thought and reaction amongst learners, as well. So, what exactly is an exploit? Let’s take a peek under the hood. Anatomy of Exploits They run the gamut in terms of how they work and what they do. The […]
Exploit vs. Antivirus: It’s No Contest
Jun 7,
2012
In a recent blog, we talked about the recent Java vulnerability and how it was still kicking around. The flaw has been identified as CVE-2012-0507 in the Common Vulnerabilities and Exposures database. You might be thinking that you are still safe, as you have antivirus. Let’s find out how well it protects you. As of […]
Bypassing User Activation Controls
May 22,
2012
My last blog about User Activation Controls suggested that they were of little help, even when they work. After all, user data (your documents, spreadsheets and such) are the most valuable things you have. Now, we’ll just trash UAC by bypassing it. We’ll do this by relying on a flaw: Microsoft loves itself. Remember, UAC […]
This Java Threat Is Really Confusing
May 11,
2012
For several months, there were rumblings in the hacker underground about some serious threats to Java and Apple’s OS X. ComputerWorld reported in late February 2012 that a new variant of an exploit called Flashback was making its rounds of Macs by using the browser and Java to get in. CNN followed by reporting that […]