TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

Security & Hacking Vulnerabilities in Windows 8

Posted by The TrainACE Team on Nov 15, 2013 10:34:55 AM

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More

Topics: advanced security, attacking and defending windows 8, cyber security, hacking, hacking vulnerabilities, malware, Microsoft, Security, security and hacking vulnerabilities windows 8, security vulnerabilities, security vulnerabilities in windows 8, Windows 8, Windows 8 Hacking, windows 8 security

With Malware Rampant on Androids, What Lies Ahead for Google Glass Security?

Posted by Lauren Archambeault on Aug 1, 2013 4:15:58 AM

Google Glass may be coming to a face near you very soon, and it has gotten a lot of attention as a new way to interact with the world and, to be sure, as a device with significant privacy implications. Less has been said about security, but there are good reasons to put that concern high on the list.

Read More

Topics: advanced security, cyber security, hacking, malware, malware analysis, mobile security, Security

FireEye and TrainACE Team Up to Offer A Free Hacking Seminar

Posted by Ryan Corey on Feb 21, 2013 4:45:37 PM

Yes, thats correct, FREE!

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, honey farm, honey net, honey pot, information assurance, malware, malware analysis, Security

Operation Beebus Attacks Discovered by FireEye

Posted by Ryan Corey on Feb 12, 2013 5:04:53 AM

Researchers at security company FireEye have revealed an advanced persistent threat targeting the U.S. defense and aerospace industries and likely originating in China. Named Beebus after an early sample, the campaign's attacks come in continuous waves over time against strategically chosen individuals. According to an unnamed inside source, the Beebus campaign began in early 2012 when FireEye noticed suspicious activity on the systems of some its defense and aerospace clients. Of 261 discovered attacks, 123 targeted unmanned aerial vehicle or systems vendors. The most recent exploit used a Deloitte industry analysis report sent in a weaponized email. Researchers believe that the campaign has so far touched 214 servers with 60 unique IP addresses.

Read More

Topics: advanced penetration testing, advanced persistent threat, advanced security, aerospace, China, cyber security, cyber war, defense, FireEye, hacking, malware, Operation Beebus, Security, Trojan back doors