Testing Your Skills at Hacker Challenge Sites

Hackers taking down websites and company networks has been a recurring topic in the news over the last few years. Many of these system breaches seem simple or easy in retrospect. But what is often overlooked is the amount of time and effort the hackers invested in learning their skills and working on a particular target.

Read more

Testing Your Skills at Hacker Challenge Sites

Hackers taking down websites and company networks has been a recurring topic in the news over the last few years. Many of these system breaches seem simple or easy in retrospect. But what is often overlooked is the amount of time and effort the hackers invested in learning their skills and working on a particular target.

Read more

Security Tips through the Lens of an IP Camera

IP cameras are remote access still and/or video cameras that enable remote monitoring of whatever is in the camera’s view. They have become very popular in recent years as an inexpensive security system. However, several serious security breaches of these devices should make us think twice before installing our own systems.

Read more

The Scourge of Ransomware in 2014

The landscape of malware has been forever changed: in 2013, we witnessed the rise of ransomware. It feeds on people’s lack of security, lack of backup, and fear of loss—a perfect storm of malicious intent. The “success” of CryptoLocker ransomware means 2014 is sure to bring a plethora of copycat ransomware to bear against us. So, what can we do to protect our data?

Read more