30 Percent of the Dark Web Goes Dark – Who Turned Off The Lights?

I recently started spending time in the Dark Web, learning how to use a VPN and the TOR browser to navigate the hidden services to be found there.  I also have been presenting a “Tour of the Dark Web” to the public in a variety of business groups.  I find the Dark Web to be a fascinating place, and so far the response from people attending my seminar indicates that I am not the only one.  One of the problems ...

Continue Reading →
0

How Do I Get Into Cybersecurity?

As an information technology educator, and cybersecurity trainer, speaker and blogger, I am often asked how to get into a cybersecurity career, or how difficult is it to get into a cybersecurity career.  Here’s what I can tell you.

You will almost in all cases need to start your cybersecurity career in a general information technology role, and work in that capacity for three ...

Continue Reading →
0

Getting Certified? Here’s How to Keep Your Certificate Valid

A little blood, sweat, and tears, study, and practice, and amazingly enough you passed the exam and earned your certification.  There used to be a time when a certification was good for life, but these days a certificate is usually valid for only three years.  The good news is that you can maintain your certification with some additional effort on your part.

The theory behind ...

Continue Reading →
0

Sunday Funnies – Genealogy

I have several friends who are genealogists, but it was one of my cybersec pals, Mike Janes, that sent this to me.  Back when I was a teen-ager at summer camp, there was a skit the counselors put on about the “Dover Family” – father Ben Dover, spouse Eileen Dover, the dog Roll Dover.  (by the way, if you remember this skit and can contribute more names, please do, I can’t find it on Google.  What?  Impossible)

Here’s some new material ...

Continue Reading →
0

Getting Certified? Here’s How To Pass The Exam

In our last post we focused on preparing for your certification exam.  Today we will address the best techniques for succeeding on exam day. 

  • Schedule Your Exam – Check with your certification authority to see which testing centers they use.  In information technology, this is generally PearsonVue or Prometric.  Go to their website, and create an account.  Then follow the instructions for your certification.  Be ...
Continue Reading →
0

Getting Certified? Here’s How to Prepare for Your Exam

You have been diligently studying the material in preparation for the exam.  The next step is to start practicing in a simulated exam environment, so you get comfortable with the look and feel of the testing environment and the test questions.

What to expect – The testing authority usually has a web page that explains what sort of test you will be taking, and what ...

Continue Reading →
0

Getting Certified? Here’s How To Study For Your Certs

There are many different ways to go about studying for and passing a certification exam.  Not every method will work for all people.  Here are some techniques that I have used to prepare for, pass, and maintain my professional certifications.

Why Certify? – There is no denying that experience is the best teacher, and time on the job is one of the major criteria used ...

Continue Reading →
0

Sunday Funnies – Enormous Michigan Fungus VS World’s Largest Aspen Tree.

What is the biggest plant in the world?  The fungus that ate the UP?  This is the second largest organism in the world, right behind another gigantic fungus in Oregon that covers 3 square miles.  But wait, there’s a quaking aspen grove in Utah that is one large genetic clone organism weighing 13 million pounds and sharing a single root system.   An interesting pair of articles from the SmithsonianFungus vs Continue Reading →

0

Weekend Update

A quick Saturday digest of cybersecurity news articles from other sources.


Holiday Scams and Malware Campaigns

11/19/2018 09:18 PM EST Original release date: November 19, 2018

As the holidays approach, NCCIC reminds users to be aware of seasonal scams and malware campaigns. Users should be cautious of unsolicited emails that contain malicious links or attachments with malware, advertisements infected with malware, and requests for donations from fraudulent charitable organizations, which ...

Continue Reading →
0
Page 4 of 147 «...23456...»