As corporations get larger and need to expand their marketing efforts, many organizations look towards the Internet. With millions of people online all at one time, it seems like the marketing capability is endless. But with the internet, things can get real messy, real fast. Malicious “hackers and crackers” are out there, looking for weak security holes and infrastructures to steal information from or to take over. Of course, this has gotten harder to do over the years, but there are still many that try.
So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).
Do you use TrueCrypt? You might not want to now. It seems as though the main SourceForge page for TrueCrypt has been defaced, though it might just be legitimate. How do I know? The first line on the page reads as follows: "WARNING: Using TrueCrypt is not secure as it may contain unfixed security issues." While many people thought it was a hoax or that TrueCrypt got hacked, the newest application that was pushed out only allows you to decrypt and migrate data, not encrypt data, was signed with the TrueCrypt private key, ensuring its legitimacy.
Do you understand the impact of digital technology on business? Once stored entirely on paper, business information, business accounts and business activities are now pretty much all in digital form. While this makes the organization and management of company information easier, the move to all things digital also poses a huge threat to businesses. Now more than ever, hackers have easier access to sensitive business information, and they can gain a hold of it within minutes. What results is a real-life digital crime scene, but unlike a “physical” crime scene, retracing digital steps can be extremely tricky. This where Computer Forensics Analysts are called in: they are responsible for decoding a digital crime scene, piecing together digital forensics information to solve a mystery.
Security researchers have recently discovered a major vulnerability in widely used encryption software that could potentially cause widespread, severe damage to the private data of millions of people around the globe. OpenSSL is a cryptologic software that used by millions of websites throughout the internet to encrypt communications between users and webpages. That data now stands at risk due to the vulnerability, which obviously is causing major concern for end-users and website owners alike. More than a half a million websites are already currently at risk.
Need a refresher on the basics of network security? Our Self-Paced Online Network Security Fundamentals training can help. Split into two separate classes that can be taken together or independently, you’ll learn how handle security threats and all about the tools that protect and defend computer networks.
Are you a fan of hacking? Do you love breaking down firewalls? Have you been attacked and want to understand the knowledge yourself? Want to break into systems without getting penalized for it? If you answered yes to any of the above questions, our Online Ethical Hacking Methods training is for you.
As the OS of choice for many businesses, Microsoft Windows houses the sensitive data of banks, hospitals and corporations. In fact, as one of the most prevalently used operating systems out there, malware authors have an affinity for attacking anything Windows—it’s their go-to playground. In order to properly defend Windows security, you’ll need to configure a lot more than just a firewall. You’ll need a myriad of tools, techniques and tricks to outsmart the bad guys and protect your Windows system. But no worries: our Microsoft Windows Security Essentials course will teach you just that.
Security threats aren't limited to one operating system, so it’s imperative that the skill set of cyber security professionals isn't either. Therefore, mastery of Linux systems is crucial for any individual seeking to claim expertise within the field.
While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.