What is a Hacker?

While the term "Hacker" is usually used with negative connotations, it's actually a neutral term that refers to someone who is a skilled computer expert that uses their knowledge to overcome problems. However, in the news the word Hacker is usually used synonymously with the term "Black Hat Hacker" which is someone that uses their... Continue Reading →

Featured post

Bitcoin: The leader of Cryptocurrencies

Modern society has already taken one major step away from paper currency with the ability to pay using debit and credit cards. However the idea of cryptocurrencies takes it a step further, no longer will payment be an exchange of dollars between accounts but it will be an exchange of completely digital money. A Cryptocurrency... Continue Reading →

Role of a Cyber Threat Intelligence Analyst

Every year thousands of new malware and vulnerabilities are introduced into business environment. Companies need to stay abreast of all of this new information in order to be effective in implementing proactive security. In order to meet this need, a fairly new field in Cyber Security has evolved known as Cyber Threat Intelligence. The most... Continue Reading →

Honeypots A Key to Network Reconnaissance

A honey pot is a computer device that is used as a decoy to lure in potential cyberattacks and gather information such as target information, method of attack and trace the attacker. It also serves as a protection measure by diverting potentially harmful malware from systems that contain sensitive information. A honeypot is comprised of... Continue Reading →

What is Encryption?

What is Encryption? Encryption has existed for hundreds of years and is a means of securing communication between two different parties. Encryption works by substituting and rearranging letters in a message so that it cannot be understand via reading, only by using a specific key can the message be returned to normal and then read... Continue Reading →

What is Ransomware?

Ransomware is a type of malware that threatens to either publish or block access to a victim's data unless a ransom is paid to the ransomware owner. Ransomware have a wide range of complexity, simple ransomware may lock your device in such a way that it can be reversed while more complicated ransomware may encrypt... Continue Reading →

Powered by WordPress.com.

Up ↑