TrainACE - IT and Cybersecurity Training Blog

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

[fa icon="calendar'] Sep 24, 2013 5:25:28 AM / by Ryan Corey posted in Cisco, cyber war, Cybersecurity, Information Assurance, Ethical Hacking

[fa icon="comment"] 0 Comments

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More [fa icon="long-arrow-right"]

Spammed and Hacked: How Social Media Can Pose a Security Risk

[fa icon="calendar'] Aug 26, 2013 5:12:40 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Information Assurance, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More [fa icon="long-arrow-right"]

Look Out IT Job Seekers! Cyber Security is the Field to Join

[fa icon="calendar'] Aug 19, 2013 3:45:24 AM / by Ryan Corey posted in advanced persistent threat, Salary, CEH, Cisco, cyber war, Cybersecurity, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

As cyber attacks increase in frequency and scandals involving governments hacking into private computers become more commonplace, it's no wonder that one of the most promising fields in the current IT sector would be cyber security. In fact, recent research has indicated that cyber security has grown by more than one hundred percent in the last year. Clearly, anyone seeking a job in the information technology area would do well to start at the first line of defense against hackers.

Read More [fa icon="long-arrow-right"]

Hacked Cars and Hotel Rooms: Time to Rethink Security for a Technological Age

[fa icon="calendar'] Aug 6, 2013 4:02:44 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Criminals have been breaking into websites and electronic databases for many years. Although this can result in huge monetary losses, it rarely injures anyone or causes physical damage. However, hackers are gaining more destructive power as manufacturers add network interfaces and microprocessors to mechanical devices. This is a security threat that we cannot afford to ignore.

Read More [fa icon="long-arrow-right"]

Operation Beebus Attacks Discovered by FireEye

[fa icon="calendar'] Feb 12, 2013 5:04:53 AM / by Ryan Corey posted in advanced persistent threat, Cisco, cyber war, Cybersecurity, Malware, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Researchers at security company FireEye have revealed an advanced persistent threat targeting the U.S. defense and aerospace industries and likely originating in China. Named Beebus after an early sample, the campaign's attacks come in continuous waves over time against strategically chosen individuals. According to an unnamed inside source, the Beebus campaign began in early 2012 when FireEye noticed suspicious activity on the systems of some its defense and aerospace clients. Of 261 discovered attacks, 123 targeted unmanned aerial vehicle or systems vendors. The most recent exploit used a Deloitte industry analysis report sent in a weaponized email. Researchers believe that the campaign has so far touched 214 servers with 60 unique IP addresses.

Read More [fa icon="long-arrow-right"]

The Cyber Security Battlefield Grows More Dangerous

[fa icon="calendar'] Jan 14, 2013 10:42:28 AM / by Ryan Corey posted in advanced persistent threat, Cisco, cyber war, Cybersecurity, Information Assurance, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

A huge portion of modern society uses some form of digital technology on a daily basis. Many conveniences on a national and personal level have been made possible due to this technology, but also opens up a Pandora's box of a whole new set of problems as well. The cyber battlefield grows more dangerous as organized hackers and other cyber threatening criminals set out to exploit the conveniences produced by the digital age for their own gain. There is an ongoing challenge, therefore, creating cyber security or defenses to protect the country from attacks; but have, on many occasions, been successfully breached to raise considerable concern even among the most savvy cyber security agencies in the world.

Read More [fa icon="long-arrow-right"]

What is Advanced Persistent Threat

[fa icon="calendar'] Dec 11, 2012 11:25:45 AM / by Ryan Corey posted in advanced persistent threat, CEH, Cisco, cyber war, Cybersecurity, Information Assurance, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

The term advanced persistent threat (APT) was originally used to describe complex, ongoing espionage perpetrated by foreign governments. However, today, APT typically refers to a category of cybercrime directed toward businesses or government entities. APTs are usually online attacks used to achieve goals beyond those that can be met by a single security breach, but some may involve malicious activity conducted onsite. Compromised computer systems are continuously monitored by the attackers or added to a stable of slave computers to be used to achieve some future goal. APTs are most often perpetrated by employing some form of malware, and IT technicians defend against APTs by installing antimalware software and hardware firewalls.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802

Speak with a Program Manager