TrainACE - IT and Cybersecurity Training Blog

Security & Hacking Vulnerabilities in Windows 8

[fa icon="calendar'] Nov 15, 2013 10:34:55 AM / by The TrainACE Team posted in Cisco, Cybersecurity, Malware, Microsoft, Ethical Hacking

[fa icon="comment"] 0 Comments

When Windows 8 debuted, it brought along a completely new interface, updated platform, and transformed user experience.

Read More [fa icon="long-arrow-right"]

Operation Beebus Attacks Discovered by FireEye

[fa icon="calendar'] Feb 12, 2013 5:04:53 AM / by Ryan Corey posted in advanced persistent threat, Cisco, cyber war, Cybersecurity, Malware, Pentesting, Ethical Hacking

[fa icon="comment"] 0 Comments

Researchers at security company FireEye have revealed an advanced persistent threat targeting the U.S. defense and aerospace industries and likely originating in China. Named Beebus after an early sample, the campaign's attacks come in continuous waves over time against strategically chosen individuals. According to an unnamed inside source, the Beebus campaign began in early 2012 when FireEye noticed suspicious activity on the systems of some its defense and aerospace clients. Of 261 discovered attacks, 123 targeted unmanned aerial vehicle or systems vendors. The most recent exploit used a Deloitte industry analysis report sent in a weaponized email. Researchers believe that the campaign has so far touched 214 servers with 60 unique IP addresses.

Read More [fa icon="long-arrow-right"]

What is Malware Analysis?

[fa icon="calendar'] Dec 4, 2012 9:23:03 AM / by Ryan Corey posted in Cisco, Cybersecurity, Information Assurance, Malware

[fa icon="comment"] 0 Comments

Nearly every security breach in a company’s online network is caused by some form of malicious computer program. These programs are generally referred to as malware, but they exist in several distinct categories, including viruses, worms and Trojan horses. Being able to identify when and how malware is affecting a computer system takes specialized training, but this knowledge increases the value of any IT security technician or manager who possesses it. These individuals are capable of assessing the scope and severity of a malware infection, which leads to efficient and detailed planning of the steps required to eliminate the malware and recover any lost data or system resources.

Read More [fa icon="long-arrow-right"]

Need IT Certifications?
Want more info?

Call (301) 220-2802

Speak with a Program Manager