Category Archives: Law

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Posted in Apple, Computer hardware, Computer Security, Education, Hacking, Home Networking, Information Technology, Internet, Law, network, Networking, Technology | Tagged , , , , , , , , , , , , | 1 Comment

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat   Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the MTSU campus May 7 and 8. This event will address criminal, intelligence, disruptive, … Continue reading

Posted in Business, Computer Security, Computers, Education, Hacking, Information Technology, Internet, Law, Networking, Technology, Windows, Wireless | Tagged , , , , , , , , , | Leave a comment

Chinese hackers and Mandiant video

Mandiant, which worked with the New York Times shows Chinese hackers.

Posted in Computer Security, Computers, Hacking, Information Technology, Internet, Law, network, Networking, Technology, Windows | Leave a comment

Middle Tennessee Cyber Summit

Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat Date: May 7 and 8 Location: MTSU New Student Union Building Registration: March 1, 2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the … Continue reading

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Law, Linux, network, Networking | Tagged , , , , , , , , | Leave a comment

Go Hack Yourself – Dark Reading

“Penetration testing is only the first step of self-inspection— ask internal auditors to scrutinize IT practices beyond compliance to take risk management to the next level – Read More  

Posted in Apple, Business, Computers, Education, Hacking, Information Technology, Law, Linux, Mobile Computing, network, Networking, Windows | Tagged , , , | Leave a comment