Security Should be Simple For the End-User?
“I wish it were easier to turn on security,” grunted my wife through gritted teeth as she tried to configure some security feature in yet another app on her laptop. We can probably all sympathize: if you want to add security to an application, you have to do work upfront and every time you use […]
Password Cracking Just Got Easier
Cracking or discovering a simple password is not difficult, but it can be time-consuming. It just got a bit quicker. We discuss and demonstrate multiple ways to do that in Learning Tree Course 468 System and Network Security Introduction. One mechanism we do not demonstrate is the use of graphics cards (GPUs) to do the […]
People May be Too Fearful of Phishing Now
For years security professionals have tried to convince family, friends, and fellow employees to be wary of unsolicited email messages. We’ve shared examples of phishing emails, sent out tests, and stressed the consequences of sharing confidential data. It all may have worked too well! SC Magazine reported last year that employees are ignoring legitimate business […]
Update Your Browser Now
Developers of internet-facing applications are constantly working to find and fix security issues with those applications. Browser writers are no exception; in fact, they may be the most active. Sometimes they find vulnerabilities on their own or by using code analysis tools. There are many lists on the ‘net of such tools and https://phoenixnap.com/blog/vulnerability-assessment-scanning-tools is […]
Is Anonymous Data Really Anonymous?
Cyber security professionals are also often involved in ensuring the privacy of organizational and customer data. One important category of that data is Personally Identifiable Information or PII. That is data where it can be determined to whom the data belongs. One example of PII is stored credit card information. A database may include a […]