hacker

Home/Tag: hacker

Inspecting Cyber Events Of July 8

By now, you've probably seen and heard a wealth of coverage pertaining to the cyber events that took place on July 8, 2015 and are known to have impacted the New York Stock Exchange and United Airlines, at the very least. Many people are reading of the reports and hearing one of two scenarios-these were very large and debilitating glitches-albeit oddly coincidental. Or that these were orchestrated attacks that could be part of a larger-scale cyber war. We know at [...]

IoT can help manufacturing, but does it make you less secure?

When companies began to embrace the idea and the tech behind the Internet of Things (IoT), one area that stood to benefit the most was, and is, the world of manufacturing. Anyplace that relies on efficient operations to keep things flowing, and does so using a litany of systems, lends itself well to the burgeoning world of IoT. Imagine if all of your numerous systems are becoming much more easy to network and thus control online-it would be a godsend [...]

Next Steps In Password Security

It used to be that you had one or two passwords. They rarely, if ever changed. You may have even had it written down on a Post-It note, placed securely next to the very PC it protected. Nowadays? Even if you are not a sysadmin, odds are you have half a dozen (or more) accounts and passwords, covering everything from e-mail to Facebook to online banking and trading accounts.  Odds are, you have a file somewhere to keep track of [...]

Hackers For Hire

Don't laugh. It  may sound crazy, but there are actually online marketplaces, online, out in the open, where you can hire a hacker to meet your particular needs. Now, the guidelines seem to indicate that every request should be on the up and up, but taking a look around tells another tale on Hacker's List. (https://nakedsecurity.sophos.com/2015/01/19/hackers-for-hire-hackers-list-for-those-with-no-ethics-or-espionage-skills/) And keep in mind-this is only one website, out in the open. This does not take into account those more unsavory actors operating in [...]

Beware Of Strange Devices

Honestly, if you are security conscious or just generally paranoid, this is likely a belief you hold near and dear. I still remember people on my earliest IT teams having an isolated computer that was used for triaging "foreign" media, things like memory sticks and USB drives that someone wanted to use on our network. The reasoning was simple - if the device in question had malicious code on it, either known or unknown, only the isolated computer would be [...]