TrainACE - IT and Cybersecurity Training Blog

10 Holiday Gift Ideas for that Cyber-Geek

[fa icon="calendar'] Dec 11, 2017 11:08:11 AM / by Madeline Sita posted in Cybersecurity, Hacking, Information Technology, online shopping

[fa icon="comment"] 0 Comments

T-minus two weeks until Christmas! It's time to get those last minute gifts. No idea where to start? Don't panic! We've come up with some outside-the-usual-gift-box ideas for that IT geek and hacker in your life.

Read More [fa icon="long-arrow-right"]

5 Cyber Security Guidelines for Vacationers

[fa icon="calendar'] Jun 26, 2015 10:28:43 AM / by Ariana Ciancio posted in Cisco, Cybersecurity, Hacking, mobile security

[fa icon="comment"] 0 Comments

It's that time of year...vacation season! Residents across the Washington, D.C. metro area are traveling to the many beaches and resorts just a day trip away! For most people, smart phones, tablets, and laptops play a huge role in everyday life, and even more so for those in the technology industry. Nonetheless, summer vacation is no excuse for travelers to neglect their cyber security. In fact, data thieves are more likely to strike when you are most relaxed and in places where people tend to let their guard down.

Read More [fa icon="long-arrow-right"]

How We Can Help You Prevent a Hacking Incident

[fa icon="calendar'] Apr 28, 2015 9:00:37 AM / by Jackie Somma posted in Hacking, Online Training, Uncategorized

[fa icon="comment"] 0 Comments

The internet is full of hackers, and these hackers grow in numbers, strength, and power each and every day. It was recently discovered that a group of hackers had managed to steal in total, around $1 billion from banks through their computers. This is thought to be one of the biggest banking breaches in history, and the robbers didn't even have to physically go to the bank. These hackers got their way into the banks' computer systems and observed the banks' operations. They either set up fake bank accounts to steal money with, or they programmed ATMs to dispense money at specific times. According to Kaspersky Labs, the hackers have attacked 100 banks in 30 countries, all fairly easily. Banks are one of the more prone industries to hacking, but they're not the only ones that need to keep a watchful eye when it comes to hacking incidents.

Read More [fa icon="long-arrow-right"]

Open SSL, Being Patched Again?!

[fa icon="calendar'] Jun 9, 2014 9:15:50 AM / by Christian Crank posted in Cisco, Cybersecurity, Hacking, openssl

[fa icon="comment"] 1 Comment

hackingback

So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).

Read More [fa icon="long-arrow-right"]

Securing Web Applications

[fa icon="calendar'] Mar 18, 2014 4:50:13 PM / by Christian Crank posted in Cisco, Cybersecurity, Hacking, web application security

[fa icon="comment"] 0 Comments

While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.

Read More [fa icon="long-arrow-right"]

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

[fa icon="calendar'] Dec 2, 2013 9:45:32 AM / by Ryan Corey posted in Cisco, Cybersecurity, Exploits, Hacking

[fa icon="comment"] 0 Comments

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More [fa icon="long-arrow-right"]

Our New Video!! Phishing with Meterpreter & Ettercap: A CEH Demo Lab

[fa icon="calendar'] Nov 25, 2013 2:01:29 PM / by Ryan Corey posted in CEH, Cisco, Cybersecurity, Hacking, Pentesting

[fa icon="comment"] 0 Comments

Christian R. Crank, a security researcher and instructor for us recently created this video on a phishing attack using Meterpreter and Ettercap. This is a lab that students perform in our Certified Ethical Hacker class. Enjoy!

Read More [fa icon="long-arrow-right"]

Security & Hacking Vulnerabilities in Windows 8

[fa icon="calendar'] Nov 15, 2013 10:34:55 AM / by The TrainACE Team posted in Cisco, Cybersecurity, Hacking, Malware, Microsoft

[fa icon="comment"] 0 Comments

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More [fa icon="long-arrow-right"]

The Importance of Secure Mobile Application Coding in Today's Fast Paced and High-Volume App Environment

[fa icon="calendar'] Oct 9, 2013 4:41:16 PM / by The TrainACE Team posted in Cisco, Cybersecurity, Hacking, mobile security, wireless security

[fa icon="comment"] 0 Comments

Mobile applications have increasingly become a popular way to reach customers in today’s digitally-driven society. With over 50 million applications in the market today, the industry continues to grow at a rapid pace. By 2015, experts expect the development of mobile applications to outnumber PC projects at a ratio of four to one. But while millions of consumers are enjoying the abundance of various beneficial and useful apps, many of them are unbeknownst to the security threats several of these apps can pose—because thousands of these app developers are abandoning methods of secure coding in hopes of putting out their products as quickly as possible.

Read More [fa icon="long-arrow-right"]

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

[fa icon="calendar'] Sep 24, 2013 5:25:28 AM / by Ryan Corey posted in Cisco, cyber war, Cybersecurity, Hacking, information assurance

[fa icon="comment"] 0 Comments

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802


or

TrainACE Catalog