Tag Archives: Hacking

The world of ‘hackonomics’ -CNN

http://edition.cnn.com/video/api/embed.html#/video/business/2014/10/27/bizview-pkg-burke-ny-dark-web-hackonomics.cnn

Posted in Technology | Tagged , , | Leave a comment

What does the term MitM’d mean?

The term MitM’d means man in the middle.  Usually refers to a device or program that intercepts traffic between a source and a target.

Posted in Technology | Tagged , , , , | Leave a comment

Can Hackers Steal Secrets from Reflections?

I encourage my students to go over and visit Rick, Paul and Bill’s blog.  In 2009, Rick posted a link to a Scientific American article on How Hackers Steal Secrets from Reflections.   Great Article.  With our students going through some … Continue reading

Posted in Computer Security, Hacking, Information Technology, network, Technology, Wireless | Tagged , , , , , , , , | 1 Comment

Protecting your network by pen testing it

This post is for educational purposes and any use of these tools against a network without explicit permission could be illegal.   Metasploit is designed to identify weaknesses in networks and hardware/software on a network.  Do NOT use metasploit for … Continue reading

Posted in Apple, Computer Security, Computers, Education, freeware, Hacking, Information Technology, Linux, network, Networking, Software, Technology, Ubuntu, Windows | Tagged , , , , , , , , , , , , | Leave a comment

Your business and home needs a firewall…why?

So what happens when you install a firewall and make sure all operating systems on your home network are fresh installs?   You’ll probably see hits from foreign and U.S. IP addresses trying to make connections to your computers, phones … Continue reading

Posted in Apple, Computer Security, Education, Health, Home Networking, Information Technology, Internet, Linux, Technology, Windows | Tagged , , , , , | Leave a comment

300,000-plus wireless routers have malicious changes

ARSTechnica outlines how hackers have made malicious changes to routers….again. Researchers said they have uncovered yet another mass compromise of home and small-office wireless routers, this one being used to make malicious configuration changes to more than 300,000 devices made … Continue reading

Posted in Technology | Tagged , , , , , | Leave a comment

800M exposed records make 2013 record year for data breaches

While the number of incidents data loss incidents in 2012 is almost by a third bigger that that for 2013, the number of records exposed in 2013 breaches has reached a record 823 million. 800M exposed records make 2013 record … Continue reading

Posted in Apple, Business, Computers, Education, Hacking, Home Networking, Information Technology, Linux, Medical, network, Networking, Organizations, Technology, Windows | Tagged , , , | Leave a comment