Top Jobs In Cybersecurity Pay Six Figures

Are you working in information technology, but your career has gone stagnant or your work become boring and repetitive?  Are you graduating from high school and considering career paths.  Are you in college earning a “computer science” degree and wondering if you will be writing code your whole life?  Maybe you should consider a career in cybersecurity.

I was interested in security ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


May the Fourth Be With You

It’s Star Wars Day!!  May the force be with you.  Jedis, Greys, and Sith unite for a day for video watching and beer.


Huge Win 10 version 1903 requires 32 GB to install

You might want to check your free space on your C drive before Patch ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 2

A guest post by KC Karnes

Mobile App Security Exploit Examples: Painful Real-life Lessons

The climate around mobile app security is heating up.

Mobile app vulnerabilities are exploited every day, resulting in expensive data breaches and loss of public trust.

In this section, we will try to learn from the failures of other companies and highlight how real the threats outlined above can be.

Timehop Fails To Trust Two-Factor Authentication

Starting in December of 2017, TimeHop ...

Continue Reading →
0

Guest Post – Mobile App Security Threats and Secure Best Practices Part 1

A guest post by KC Karnes

Is your mobile app secure?

It shouldn’t come as a surprise that mobile apps are targeted by hackers, given the rapid adoption and increased usage globally. By some estimates, one out of every 36 mobile devices has high-risk apps installed.1

An even more sobering mobile app security statistic for businesses to hear: 71% of fraud transactions came from mobile apps and mobile browsers in ...

Continue Reading →
0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


North Korean Malicious Cyber Activity

Original release date: April 10, 2019

The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) have identified a Trojan malware variant—referred to as HOPLIGHT—used by the North Korean government. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA.

The Cybersecurity and Infrastructure ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 3

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second ...

Continue Reading →
0

Guest Post – The Ultimate Online Privacy Guide Part 2

Privacy has taken a huge hit since the introduction of the Internet.  Google and Facebook are data mining our lives for information they can sell to advertisers and marketers.  Our own government spies on us illegally without stop.  Our information is stored on websites, and scoped up in huge data breaches, ending up in the hands of cyber-criminal gangs.  What can we do about it?  Today we publish the second ...

Continue Reading →
0
Page 117 of 272 «...90100110115116117118119...»