877.791.9571 |

About the Author:

Kim Crawley is currently a security author for InfoSec Institute. She has worked in tech support and as an IT technician for a variety of smaller businesses. She has learned about vulnerabilities in network protocols, operating systems, applications and hardware and uses that knowledge in her everyday work in IT. Learning how malware is developed and how cracking works informs her views on keeping networks secure.
heartbleed04142014

A Bug That’ll Make Your Heartbleed

Darn, I had to change my Dropbox password a few days ago. For good measure, I changed my Google password, too. Although I only use it for OAuth these […]

Tor-logo04072014

What Good is Tor in 2014?

,

To the uninitiated, Tor, formerly known as The Onion Router, is probably the most popular proxy network for internet anonmyzing. It’s called an onion router because traffic goes through […]

linux-windows-04022014

How to Migrate an Entire Office from Windows to Linux

More and more, small, medium, and even large businesses are migrating from Microsoft products. Many of them are ridding themselves of Microsoft completely.

If you were to ask those IT […]

Offshoring03202014

The Systematic and Security Problems of Offshoring

Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive.

Venture capitalist firms, public shareholders, various types of financial firms, and […]

What You Need to Know About Linux Rootkits

Imagine that you’re using your PC, server, smartphone or tablet. The operating system and applications on it aren’t behaving the way they usually do.

You pull up Google’s search page […]

android-app-security02052014

Android App Permissions and Security: What You Need to Know

As of this writing in February 2014, Android has the greatest OS market share on both smartphones and tablets. If you don’t own an Android device, chances are that […]

credit-cards-01222014

Buyer Beware: Your Credit Card and Debit Card Data Can Be Stolen at the Cash Register

Most adults in the developed world have bank accounts and credit cards. Most of us use debit cards and credit cards at the cash registers of our favorite retailers, […]

CanDavidCam1-11262013

Can David Cameron Block Web Porn from the Brits?

Screenshot from ironic Daily Mail web page, credit http://ontoberlin.blogspot.ca/2013/07/three-concerns-about-camerons-porn-plans.html
It’s too easy for politicians to make promises. Throughout the 20th century and right through the 21st to the present day, […]

A Vulnerable Civic Infrastructure: The Attack on South Houston’s SCADA Water System

,

As the world becomes increasingly digitized, IT security impacts more and more of our lives. Most ordinary citizens are unaware of how our important civic services- electricity, public transportation […]

Privacy and Big Data Book Review

Privacy and Big Data
Terence Craig and Mary E. Ludloff
O’Reilly Media

At this point, everyone and their uncle is on Facebook. Free webmail accounts via providers such as Hotmail or Gmail […]

Dangerous Texts: Preventing SMS Cracking

,

The very first SMS (Short Messaging Service) message was sent on December 3rd, 1992. As cellular phone technology exploded since then, now your average person sends and receives many […]

9 Easy WordPress Security Tips: Hardening WordPress

WordPress is the most popular Content Management System (CMS) on the World Wide Web.

I’m one of the two web developers for Liberbyte.com, a tech blog with a focus on […]

A History of Anonymous

, ,

Anonymous is the most famous ‘hacktivist’ group in the world. The informal nature of the group makes its mechanics difficult to define. Subsequently, without a formal organizational hierarchy, it’s […]

Cracking Democracy – Hacking Electronic Voting Machines

,

Communications around the world are gradually going digital.

I was born in 1984. I would expect, if I entered a typical office workplace that year, to find various filing cabinets, […]