877.791.9571 |

About the Author:

Kim Crawley is currently a security author for InfoSec Institute. She has worked in tech support and as an IT technician for a variety of smaller businesses. She has learned about vulnerabilities in network protocols, operating systems, applications and hardware and uses that knowledge in her everyday work in IT. Learning how malware is developed and how cracking works informs her views on keeping networks secure.
JPMorgan-Chase09092014

Russia Versus Wall Street: The JPMorgan Attack

JPMorgan Chase is the largest bank in the United States, with total assets of over $2.5 trillion. They reportedly spend about $250 million per year on technical security, or […]

emailEncrypt08212014

PGP Alternatives for Email Encryption

A few weeks ago, I wrote an article for 2600 Magazine. (If you’re curious, publication has been confirmed and you’ll probably see it in the Winter 2014-2015 issue.) The […]

cyber_china08112014

America’s and Canada’s Overlooked Threat: Chinese Cyberwarfare

Canadian Chinese Embassy spokesperson Yang Yundong can’t pull the wool over my eyes.

“The Chinese government has always been firmly opposed to and combated cyber attacks in accordance with the […]

iOS-backdoor07302014

Have New Backdoors Been Discovered in iOS? An Interview With iOS Developer and Digital Forensics Expert Jonathan Zdziarski

When the HOPE X (Hackers On Planet Earth) 2014 convention started on July 18th, one particular presentation caught the undivided attention of information security professionals. Ever since, the tech […]

bridge-trans-firewall-07152014

A Bridge Over Troubled Traffic: An Introduction to Transparent Firewalls

The proper implementation of network appliances is vital to designing and maintaining a properly secured network. Modern networking devices usually integrate multiple functions into one box. For example, most […]

fingerprint

What You Must Know About OS Fingerprinting

For those of us in the information technology field, there are two reasons why we should understand operating system fingerprinting.

The first reason is to better design and implement security […]

remote-access-04242014

How to Remote Access the Secure Way

Businesses in all industries often need to provide their employees with a way to access their internal networks when they’re away from the office. Such functionality is especially important […]

HuntingMalware01162014

A History of Malware: Part Four, 2000-2005

I remember the eager anticipation that led to the turn of century. All throughout 1999, all I ever saw or heard in the media was millenium this, millenium that. […]

HuntingMalware01162014

A History of Malware: Part Three, 1993-1999

In my previous article, I explained what happened to the evolution of malware when microcomputers started to become a major presence in small offices and households. That coincided with […]

History-of-Malware05132014

A History of Malware: Part Two, 1989-1992

,

In my previous article, I told the story of the very first worms and viruses. Interestingly, a groundbreaking mathemetician, John von Neumann, and a science fiction novelist, John Brunner, […]

History-of-Malware05132014

A History of Malware: Part One, 1949-1988

,

These days, malware is an everyday concern, even among ordinary end users. A countless amount of money is lost every year worldwide due to malware, possibly in the hundreds […]

POS-malware-04212014

Attention Retailers and Restaurants: Three Simple Ways to Avoid What Happened to Michaels, Target and Neiman Marcus

I feel like I’m stuck in Bill Murray’s Groundhog Day. Yet again, it came to my attention that a major American retailer has been hit with POS (point-of-sale) malware. […]

heartbleed04142014

A Bug That’ll Make Your Heartbleed

Darn, I had to change my Dropbox password a few days ago. For good measure, I changed my Google password, too. Although I only use it for OAuth these […]

Tor-logo04072014

What Good is Tor in 2014?

,

To the uninitiated, Tor, formerly known as The Onion Router, is probably the most popular proxy network for internet anonmyzing. It’s called an onion router because traffic goes through […]

linux-windows-04022014

How to Migrate an Entire Office from Windows to Linux

More and more, small, medium, and even large businesses are migrating from Microsoft products. Many of them are ridding themselves of Microsoft completely.

If you were to ask those IT […]

Offshoring03202014

The Systematic and Security Problems of Offshoring

Over the past twenty years or more, corporations in nearly all industries have been outsourcing and offshoring at hyperdrive.

Venture capitalist firms, public shareholders, various types of financial firms, and […]

What You Need to Know About Linux Rootkits

Imagine that you’re using your PC, server, smartphone or tablet. The operating system and applications on it aren’t behaving the way they usually do.

You pull up Google’s search page […]

android-app-security02052014

Android App Permissions and Security: What You Need to Know

As of this writing in February 2014, Android has the greatest OS market share on both smartphones and tablets. If you don’t own an Android device, chances are that […]

credit-cards-01222014

Buyer Beware: Your Credit Card and Debit Card Data Can Be Stolen at the Cash Register

Most adults in the developed world have bank accounts and credit cards. Most of us use debit cards and credit cards at the cash registers of our favorite retailers, […]

CanDavidCam1-11262013

Can David Cameron Block Web Porn from the Brits?

Screenshot from ironic Daily Mail web page, credit http://ontoberlin.blogspot.ca/2013/07/three-concerns-about-camerons-porn-plans.html
It’s too easy for politicians to make promises. Throughout the 20th century and right through the 21st to the present day, […]