Category Archives: Law

Your Location has been Shared 5,398 Times in Last 14 Days

Your Location has been Shared 5,398 Times in Last 14 Days.

Posted in Apple, Business, Information Technology, internet security;, Law, Linux, Mac, Microsoft | Tagged | Leave a comment

The dangers of using outdated software

 Outdated software contains security flaws which cybercriminals can use as avenues to infiltrate the corporate network. The dangers of using outdated software.

Posted in Apple, Business, Computer Security, Computers, Education, Hacking, Home Networking, Industry, Information Technology, Law, Linux, Manufacturing, Medical, Organizations, Software, Windows | Tagged , , , , | Leave a comment

The life of a file

The life of a file… 8:00 a.m.  The executive secretary begins writing a credit memo for several clients.  The file has sensitive data. 8:15 a.m.   The file is saved to the documents folder on the secretary’s desktop.   The … Continue reading

Posted in Computer Security, Education, Hacking, Information Technology, Law, network, Networking, Organizations, Technology, Windows | Tagged , , , , , , | Leave a comment

A Search Engine that shows devices on the web

Secure your devices.  Bottom-line, there are malicious users on the web that can find your device (webcams, IP cameras, routers, SCADA and other devices).  Change the default passwords and update software/firmware when it is available.  Disable UPNP and look for … Continue reading

Posted in Technology, Education, Internet, Law, network, Information Technology, Computer Security, Hacking, Networking, Apple, Computer hardware, Home Networking | Tagged , , , , , , , , , , , , | 1 Comment

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat

2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat   Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the MTSU campus May 7 and 8. This event will address criminal, intelligence, disruptive, … Continue reading

Posted in Business, Computer Security, Computers, Education, Hacking, Information Technology, Internet, Law, Networking, Technology, Windows, Wireless | Tagged , , , , , , , , , | Leave a comment

Chinese hackers and Mandiant video

Mandiant, which worked with the New York Times shows Chinese hackers.

Posted in Computer Security, Computers, Hacking, Information Technology, Internet, Law, network, Networking, Technology, Windows | Leave a comment

Middle Tennessee Cyber Summit

Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat Date: May 7 and 8 Location: MTSU New Student Union Building Registration: March 1, 2013 Middle Tennessee Cyber Summit: Building Partnerships and Understanding the Threat will be held on the … Continue reading

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Law, Linux, network, Networking | Tagged , , , , , , , , | Leave a comment

Go Hack Yourself – Dark Reading

“Penetration testing is only the first step of self-inspection— ask internal auditors to scrutinize IT practices beyond compliance to take risk management to the next level – Read More  

Posted in Apple, Business, Computers, Education, Hacking, Information Technology, Law, Linux, Mobile Computing, network, Networking, Windows | Tagged , , , | Leave a comment

What is a dead drop? Are they dangerous or illegal?

Dead drops are usb drives hidden usually on private property and could possibly involve vandalism and illegal activities.   Dead drops can possibly contain viruses, illegal music, documents and other information that can be considered illegal or malicious. Dead drops are used … Continue reading

Posted in Computer hardware, Computer Security, Computers, Education, Hacking, Information Technology, Law, network, Networking, Technology, Windows | Tagged , , | Leave a comment

FEMA, FCC Announce Nationwide Test Of The Emergency Alert System

WASHINGTON, D.C. — The U.S. Department of Homeland Security’s Federal Emergency Management Agency (FEMA) and the Federal Communications Commission (FCC) will conduct the first nationwide test of the Emergency Alert System (EAS). The nationwide test will occur on Wednesday, November … Continue reading

Posted in Business, Internet, Law, Organizations, Technology | Tagged , , , | Leave a comment

87% of employees use personal devices for work – link and poll

You cannot effectively protect corporate data and intellectual property. It takes skilled IT professionals to protect your data. A new survey by DELL Kace revealed 87 percent of companies have employees that use some kind of personal device for work … Continue reading

Posted in Business, Computer Security, Computers, Education, Hacking, Health, Information Technology, Internet, Law, Medical, Networking, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Photos of Fake Checks – Fraud

Here’s an example of fake checks that may come to you through responding to emails, online auctions or just out of the blue…don’t cash these type of checks if you receive them…examples of phishing are listed in previous posts. If … Continue reading

Posted in Hacking, Information Technology, Internet, Law, Networking, Organizations, Technology | Tagged , , , , , , , , , , | 1 Comment

Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics)

This sort of information should be useful to forensics investigators, folks trying to cover their tracks, folks trying to uncover people’s track….Forensically interesting spots in the Windows 7, Vista and XP file system and registry (and anti-forensics). This article is … Continue reading

Posted in Computer Security, Computers, Hacking, Information Technology, Law, network, Networking, Technology | Leave a comment

Yale confirms 10-month-long data breach

Names and Social Security numbers of some 43,000 people that were affiliated with Yale University back in 1999 have been accessible to users of the Google search engine for the past ten months, reports the Yale Daily News  Yale confirms 10-month-long data … Continue reading

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Internet, Law, Technology | Tagged , , , , , | Leave a comment

Office 2010 Books

Here’s some great links for Office 2010’s Resource Kit and books.   Office 2010 Resource Kit Technical Library in Compiled Help format Technical diagrams for Office 2010 Downloadable book: Getting started with Office 2010 Downloadable book: Planning guide for Office … Continue reading

Posted in Business, Computers, Education, Health, Information Technology, Law, Medical, Organizations, Soft Skills, Software, Technology | Tagged , , , , , , , , , , , | Leave a comment

Virtual Arkham – A good read

In the case of Anonymous and their spin off groups, I have observed a shift in personalities that could be termed an evolution in motivations and thought. Generally though, the game plan seems to be just a general way for … Continue reading

Posted in Computer Security, Computers, Education, Hacking, Information Technology, Internet, Law, network, Organizations, Technology | Tagged , , , , , , , , | Leave a comment

EC-Council Featured in CNN-The Wolf Blitzer Show

EC-Council Featured in CNN | The Wolf Blitzer Show    Aug 4, 2011 | Albuquerque, NM – Jay Bavisi, president of EC-Council, was earlier interviewed by CNN, to comment on the massive cyber spying incident which targeted agencies and groups in … Continue reading

Posted in Computer Security, Computers, Hacking, Information Technology, Law, Organizations, Technology | Tagged , , , , , | Leave a comment

Anonymous Claims Network Breach of FBI Security Contractor ManTech – Security – News & Reviews – eWeek.com

Anonymous Claims Network Breach of FBI Security Contractor ManTech – Security  Anonymous continued with its string of attacks designed to embarrass the FBI, this time claiming to have breached the network of ManTech International, the FBI’s cyber-security contractor…

Posted in Business, Computer Security, Computers, Hacking, Information Technology, Internet, Law, network, Technology | Tagged , , , , , | Leave a comment

Major ISPs agree to “six strikes” copyright enforcement plan

Major ISPs agree to “six strikes” copyright enforcement plan via ARS Technica

Posted in Computers, Education, Hacking, Information Technology, Law, Software | Tagged , , , , , , | Leave a comment

Forensics

The Tennessee Technology Center at Shelbyville will be offering a free Computer Forensics class to Law Enforcement and Information Technology Personnel.  The Tennessee Technology Center at Shelbyville is a member of the Tennessee Board of Regents and is an accredited … Continue reading

Posted in Computers, Education, Internet, Law | Tagged , , , , , , , , , , , , , , | Leave a comment