TrainACE Learning Blog

Subscribe to our Blog

Recent Posts

Posts by Topic

see all

5 Cyber Security Guidelines for Vacationers

Posted by Ariana Ciancio on Jun 26, 2015 10:28:43 AM

It's that time of year...vacation season! Residents across the Washington, D.C. metro area are traveling to the many beaches and resorts just a day trip away! For most people, smart phones, tablets, and laptops play a huge role in everyday life, and even more so for those in the technology industry. Nonetheless, summer vacation is no excuse for travelers to neglect their cyber security. In fact, data thieves are more likely to strike when you are most relaxed and in places where people tend to let their guard down.

Read More

Topics: advanced security, cyber security, hacking, mobile security, Security

Open SSL, Being Patched Again?!

Posted by Christian Crank on Jun 9, 2014 9:15:50 AM

So OpenSSL is being patched again, very shortly after the Heartbleed Bug was fixed. According to the OpenSSL Security Advisory, multiple security vulnerabilities affecting the security layer have been recently discovered. One of the security threats actually allowed an attacker to see and modify traffic between an OpenSSL server and the client. While this news might seem bad, finding these vulnerabilities indicate that OpenSSL is frequently monitored by security professionals, and the appropriate steps are being followed to patch these vulnerabilities. This in turn makes OpenSSL a more secure implementation of the protocols SSL/TLS (Secure Socket Layer/Transport Layer Security).

Read More

Topics: cyber, hacking, hacking vulnerabilities, openssl, security, Security, vulnerability

Securing Web Applications

Posted by Christian Crank on Mar 18, 2014 4:50:13 PM

While the Internet is an integral part of most organizations today, this widely used public network is also the source of data theft, cyber stalking and many other dangerous threats. Navigating the web safely can be particularly difficult---many cannot identify a threat before it strikes.

Read More

Topics: advanced security, hacking, Security, web app hacking, web application security

Join Our Webinar on romanHunter, an Open Source Wireless Honeypot

Posted by Ryan Corey on Dec 2, 2013 9:45:32 AM

We have scheduled our next webinar. Its on romanHunter (ROuter MAN HUNTER). romanHunter is an open source wireless honeypot that has a number of tricks which can help you to bait and catch people attacking your network.

Read More

Topics: advanced security, cyber security, hacking, honey farm, honey net, honey pot, Security, wireless

Our New Video!! Phishing with Meterpreter & Ettercap: A CEH Demo Lab

Posted by Ryan Corey on Nov 25, 2013 2:01:29 PM

Christian R. Crank, a security researcher and instructor for us recently created this video on a phishing attack using Meterpreter and Ettercap. This is a lab that students perform in our Certified Ethical Hacker class. Enjoy!

Read More

Topics: ceh, CEH training, certified ethical hacker, cyber security, ettercap, hacking, meterpreter, penetration testing, Security

Security & Hacking Vulnerabilities in Windows 8

Posted by The TrainACE Team on Nov 15, 2013 10:34:55 AM

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More

Topics: advanced security, cyber security, hacking, hacking vulnerabilities, malware, Microsoft, Security, security vulnerabilities, Windows 8

The Importance of Secure Mobile Application Coding in Today's Fast Paced and High-Volume App Environment

Posted by The TrainACE Team on Oct 9, 2013 4:41:16 PM

Mobile applications have increasingly become a popular way to reach customers in today’s digitally-driven society. With over 50 million applications in the market today, the industry continues to grow at a rapid pace. By 2015, experts expect the development of mobile applications to outnumber PC projects at a ratio of four to one. But while millions of consumers are enjoying the abundance of various beneficial and useful apps, many of them are unbeknownst to the security threats several of these apps can pose—because thousands of these app developers are abandoning methods of secure coding in hopes of putting out their products as quickly as possible.

Read More

Topics: advanced security, app market, cyber security, hacking, mobile apps, mobile phones, mobile security, secure coding, secure mobile application coding, Security, security training, wireless security

Exploring Secure Email After The Silent Circle And Lavabit Shut Downs

Posted by Ryan Corey on Sep 24, 2013 5:25:28 AM

Both Silent Circle and Lavabit recently shut down their encrypted email services. Lavabit was the first to take action following word that the United States government wanted data handed over that would violate customers' privacy. Ladar Levison, owner of Lavabit, said he faced the decision of complying with the government and betraying the American people or ending the email service he worked hard to build. He also said that he was legally unable to explain the events leading up to his decision due to recent laws passed by congress blocking his freedom of speech.

Read More

Topics: advanced security, cyber security, cyber war, hacking, information assurance, secure email, Security, security training

What is Threat Intelligence?

Posted by Ryan Corey on Sep 18, 2013 7:51:12 AM

Across the country and around the world, cyber attackers continue to discover new and improved ways of wreaking havoc with company's business operations. Their nefarious activities are responsible for billions of dollars' worth of damages in intellectual property theft. While cyber security teams attempt to circumvent these onslaughts, increased technological advancements continue to speed up the time between perceived threat and actual intrusion. How can a business entity keep up?

Read More

Topics: advanced persistent threat, advanced security, cyber security, hacking, information assurance, Security, security training, threat intelligence

Spammed and Hacked: How Social Media Can Pose a Security Risk

Posted by Ryan Corey on Aug 26, 2013 5:12:40 AM

Social networks are social by design. They mean to foster interaction, to put you in touch in one way or another. Some put you in touch with friends and family. Others put you out there for the whole wide world to see. Some uses are personal. Others are all business. In the end, though, social media platforms are all designed to be easy to access and easy to use. They’re intentionally informal. They’re the last place you’d expect to find classified intelligence or the kind of business secrets that companies diligently guard.

Read More

Topics: advanced ethical hacking, advanced penetration testing, advanced persistent threat, advanced security, certified ethical hacker, cyber security, cyber war, hacking, information assurance, Security, security training