Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.
Articles & Videos
The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report …
I'd like to move from our current P.O.S system and members database, to a cloud-based solution.
The company we’d like to use is ISO 27001 security accredited, they don’t store credit card info and …
One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.
What software do you recommend for
Laptop "remote wipes" or "total lockdowns"
so data cannot be taken from the harddrive
when something like the below happens
in the FUTURE ?
I assume the …
In my wireshark evaluation of a malware from a word document, I noticed that it makes an HTTP POST to a site.
The post packet contains information about my computer. GUID, BUILD, INFO, IP, TYPE, …
I am just wondering what extra could I do for my company from the security point of view.
We have onsite server, exchange online, firewall and analyzer on place, AV running on each wks …
A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.
I know Office 365 security and compliance module already has something like this but it's not ideal... Clumsy to export and too much manipulating data to get the simple data i'm looking …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art …
Are any of you using an IRR (Incident Response retainer) to assist with Cyber incidents ? I am curious to know from others how well this is working for your organizations and if you feel there is good…
ON a windows 7 computer I run netstat and see established connections
proto Local Address Foreign Address State
tcp 10.50.50.50:49198 …
Could you helpe me to understand something please.
How is possible that over one week my network at work made 16,355 connections?
For example 1969 widnows update connections how is …
A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a …
How do I trace an email address back to the IP address of computer it came from?
It's a yahoo email address ?
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name …
The Email Laundry PDF encryption service allows companies to send confidential encrypted emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The …
Evening. I have a server that got infected with the file "Photo.scr" and its copied itself to every folder and subfolder on my drive M.
I am trying instructions of what I can find online but with no …
My daily bandwidth repots show some IP addresses that are trying to access my systems
What tools (https://www.iplocation.ne
These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives basic information about SQL injections
I have noticed today on my weekly Firewall report botnet initiator. It is one connection from yestarday please see below
Could you help me what shuld I do ? is it false positive ? …
I have a need to invoke YARA to search on a Yara rule that was published as an IOC.
What are some recommended ways to deploy Yara to a network of 1000 windows computers and then …
verizon fios residential internet so i am limited and do not want to create evil twin access
2 computers windows 10 both with wireshark installed
i want to see traffic from other devices …
I am looking for perhaps 5 opinions from different experts regarding security of bitlocker in win 10.
How would you rate the security of a portable drive with a password of 25 places?
I own two public CDIR blocks.
Let's say they are:
CIDR Block 1 - 100.100.100.0/24
CIDR Block 2 - 184.108.40.206/24
I see the same source IP from China doing a reconnaissance scan on …
12 Steps to a more secure Internet experience (http://tekblog.teksquisit
Since my first article (https://www.experts-excha