Identity theft is a very real threat. I don’t need to tell you what kind of a serious impact it can have on your life. If you happen to become…
Identity thieves are a serious threat. Identity protection services aims to solve that issue, but some of the services may be over-hyped. Here’s what you need to know, as well as some helpful tips to protect your identity online.
While there are some very good and reputable credit repair companies, you should not rule out the possibility of credit repair fraud. Here are some tips to help you distinguish the cons from the pros.
With a few relatively simple tips, you can adjust your online privacy so you are only sharing the information that you want to share to the people that you want to share it with
Stalking is a very real problem, and social media has made it easy for anyone to become a victim. Stalkers come in all forms. Some can just follow you on online, but others could use the information they find online and through social media to find you in the real world.
Few things are more frustrating than dealing with an attack on your website. Here are some helpful tips to help you beef up the security around your WordPress site.
The W3AF web app vulnerability scanner has come a long way in the past few years. I have used a number of W3aF install scripts and have read a number…
SQL Injection Testing Environment is a free vulnerable web app designed to teach you SQL Injection, or help you sharpen your skills in web application hacking.
Parallels announced results of its commissioned survey of more than 200 IT decision makers about their attitudes toward Macs in the enterprise.
1Password has become my goto app of choice for secure password storage. I use 1Password to manage all of my various passwords and private information.
There are a number of laws, both state and Federal, that have been created to address the problem of identity protection and identity theft. Unfortunately, these regulations only extend to Federal systems, or systems covered under Federal law.
As new information continues to unfold surrounding the Target data breach, it is becoming evident that there were multiple security failures which ultimately lead to a major catastrophic data breach. This post identifies several events surrounding the Target data breach, and the PCI DSS regulation failures surrounding each of those events.
Clickjacking for Social Engineering This stealth social media clickjacking code is designed to steal ‘likes’ or increase social rankings from unsuspecting website viewers. I developed this code as a way…
We are happy to offer a copy of the NIST 800-53 v4 security controls in Excel (XLS) format. Primed and ready for database consumption.
Fully complete and tested guide to get Metasploit Framework and Armitage running on OSX 10.9 (or earlier) using either Homebrew or Macports.