The Targeting Of Elections By Hackers:The Targeting Of Elections By Hackers One of the main things to understand is that hacking is not new to the technology age, this is...
Your Facebook Hasn't Been Hacked Or Cloned This Time (HOAX)Of course we all know that security online is a major issue in 2018 as it has been since the inception of the internet. The only...
SamSam: Who Got Hit and How It WorksA Few Things To Know About SamSam SamSam ransomware is not new it has been around a couple of years and has been used in attacked against...
Why Security By Obscurity Is No Longer An Option For Small BusinessesQuite often in my endeavors with clients I encounter two different philosophies toward IT Security among small businesses. There are...
Let’s Talk About Secure PhP Code and Word Press (short read)Let’s Talk About Secure PhP Code and Word Press: What Is PhP Really? To start off just in case someone reading isn’t familiar, let’s...
Here’s How AlienVault Works In Simple TermsAlienVault itself as a company focuses on creating commercial and open source technologies and solutions to manage cyberattacks. The...
Introduction To Open SSHFirst things first, for those of you who don't know the acronym it stands for open secure shell. Secure Shell is a protocol that uses...
NiceHash CryptoCurrency Market HackedOver the past two years much attention has been paid to the world of crypto-currency. Bitcoin increased in popularity as with other...
The Vulnerabilities of IoTAs the world continues to reshape itself, we are becoming increasingly connected through technology. Technology is reshaping every single...
Let's Talk About Computer ForensicsWhat Is Computer Forensics? It is important to note that this is an opinion piece based on study and experience, so many security experts...