• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Home
  • About
  • Structure
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackey

Uncategorized

A Solution to Hackers? More Hackers

December 19, 2017 by Sachin Shah Leave a Comment

https://www.nytimes.com/2017/08/02/technology/a-solution-to-hackers-more-hackers.html

Over the last year, people realize how dangerous hackers can be. This article brings to light the theory that What if the problem we face is not too many bad hackers, but too few good ones? In recent conventions hackers have discussed what happened in the last election and how to prevent those in the future.
There are hackers who are renegades and culprits, yet there are some that are patriotic and hack for good causes. The private sector has already discovered the benefits of hackers. Most major tech companies — including Facebook, Apple and Microsoft — offer “bug bounty” programs, in which they offer financial rewards to hackers who find holes in their security measures. Government jobs are not ideal environment for people with hacking abilities and the private sector pays more. So why are there so many cyber security jobs unfilled? Government jobs require extensive background checks so that eliminates some government opportunities.
Recently Government agencies experimented with a similar approach. The Defense Department offered the first-ever federal bug bounty program last year, called Hack the Pentagon. The result was that 138 vulnerabilities were found. At the recent Def Con convention most hackers were able to hack into all the voting machines that were bought in. Companies should take advantage of hackers and their willingness to help secure the national infrastructure.

https://www.nytimes.com/2017/08/02/technology/a-solution-to-hackers-more-hackers.html

Google Detects Android Spyware That Spies On WhatsApp, Skype Calls

December 5, 2017 by Joseph Nguyen Leave a Comment

Discovered on targeted devices in African countries, Tizi is a fully-featured Android backdoor with rooting capabilities that installs spyware apps on victims’ devices to steal sensitive data from popular social media apps like Facebook, Twitter, WhatsApp, Viber, Skype, LinkedIn, and Telegram.

Some protection on your Android phone is good like Lookout Security & Antivirus.

 

https://thehackernews.com/2017/11/android-spying-app.html

When low tech is a better choice

November 30, 2017 by Ronghui Zhan Leave a Comment

https://www.techdirt.com/blog/?tag=door+locks

we rely on technology. Many of us cannot live without smart phone. if one day power off, do we have alternatives?

Amazon FreeRTOS will connect embedded IoT devices with Amazon Web Services’ cloud

November 30, 2017 by Ronghui Zhan Leave a Comment

Amazon is really creative company. Now they are leading the trend of IOT, such as Amazon Echo. Embedding IOT device with AWS cloud is their new move.

https://www.geekwire.com/2017/amazon-freertos-will-connect-embedded-iot-devices-amazon-web-services-cloud/

How did North Korea get its nuclear weapons?

November 30, 2017 by Ronghui Zhan Leave a Comment

This is very interesting article.

https://www.channel4.com/news/factcheck/how-did-north-korea-get-its-nuclear-weapons

if technology falls into wrong hand, bad things happen.

Quantum encryption is now fast enough for voice calls

November 28, 2017 by Joseph Nguyen Leave a Comment

Quantum encryption is theoretically a dream for security, as you can’t even inspect the data without altering it. However, it’s currently several times slower than the conventional kind, which makes it impractical for voice calls or streaming video

Researchers have developed a quantum encryption key distribution system that promises to be five to 10 times faster than existing methods.

 

https://www.engadget.com/2017/11/26/scientists-develop-fast-quantum-encryption/

Four Disruptive ‘Cyber Trends’ At RSA

November 14, 2017 by Brent Hladik 1 Comment

https://www.forbes.com/sites/jasonbloomberg/2017/02/20/four-disruptive-cyber-trends-at-rsa/#5272e2d69917

This article is interesting in all of the different kinds of cyber tools out there that companies could use to

analyze any kind of potential cyber security attack on their systems.

DHS Official: No Proof Kaspersky Software Used to Hack Fed IT

November 14, 2017 by Brent Hladik 1 Comment

https://www.databreachtoday.com/dhs-official-no-proof-kaspersky-software-used-to-hack-fed-it-a-10456

Despite everyone’s concern about the Russians using Kaspersky to spy on the governments computer systems there is no evidence that this has occurred.  While at the same time ruining a corporations image.   People react out of fear and in this case it proves it in my opinion.

Hacked Home Devices Can Spy On You

November 14, 2017 by Brent Hladik Leave a Comment

https://www.nbcnews.com/tech/security/hacked-home-devices-can-spy-you-n814671

 

This is kind of scary considering more and more of our appliances/devices connect to the internet.

It is scary because if hackers really want to mess with major corporations they can potentially mess

with them through their appliances without them knowing it.

New Cobra Crysis Ransomware Variant Released

November 10, 2017 by Joseph Nguyen Leave a Comment

This new version will append the .cobra extension to encrypted files. It is not known exactly how this variant is being distributed, but in the past Crysis was typically spread by hacking into Remote Desktop Services and manually installing the ransomware.

 

https://www.bleepingcomputer.com/news/security/new-cobra-crysis-ransomware-variant-released/

  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Go to Next Page »

Primary Sidebar

Weekly Discussions

  • Uncategorized (33)
  • Week 01: Overview (2)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (11)
  • Week 04: Vulnerability Scanning (14)
  • Week 05: System and User Enumeration (13)
  • Week 06: Sniffers (17)
  • Week 07: NetCat and HellCat (17)
  • Week 08: Social Engineering, Encoding and Encryption (21)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (17)
  • Week 11: SQL Injection (13)
  • Week 12: Web Services (18)
  • Week 13: Evasion Techniques (13)
  • Week 14: Review of all topics (11)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in