In this training video, IT Security Instructor Mike Danseglio presents the philosophy and processes hackers engage in when trying to hack your information and assets. Interface Technical Training offers IT Security Certification Training classes. Our courses are available in class or online with our virtual instructor-led training product RemoteLive™. CompTIA Security + SEC155: CompTIA Security+ Skills … Continue reading How Hackers Hack Your Assets – A Security Training Video for Everyone
CompTIA Instructor Steve Fullmer describes the importance of getting Security+ Certified. Security is no longer about the “haves” and the “have nots” a small group of people who are trying to take advantage of your possessions and intellectual property (IP). In the book ‘Tribal Leadership’ by Dave Logan, John King, Halee Fischer-Wright, they discuss the stages of … Continue reading CompTIA Security+ What Motivates People to Take Your Intellectual Property?
Video Transcription: I’m Mike Danseglio, and I’m an instructor here at Interface Technical Training. I teach IT Security courses, so I’m plugged-into a lot of what goes on in the security field. I keep abreast of situation. I tend to write a lot of blogs around what’s going on in security and how to … Continue reading The Importance of Maintaining Apple iPhone Security Engineering – Technology – People – Process
A skilled attacker usually begins an attack by performing detailed reconnaissance. Recon is critical to a comprehensive attack as it yields information about the target network, hosts, personnel, publicly accessible assets, and a host of other data. One of the easiest targets is a website. Websites are, by design, highly accessible and loaded with data. … Continue reading Using WebRipper to Examine Website Content
A former student sent me an email requesting assistance with a computer issue. Microsoft Security Essentials continued to post the message “error warning: HACKTOOL:WIN32/Keygen”. Hacktool malware was quarantined. Other symptoms started to appear. Following appropriate guidance, the student looked into the event viewer. The most often repeated error that the student noticed was “The driver … Continue reading A Malware Recovery Scenario – Hacktool
Generating Random Numbers for Cryptography with Lava Lamps? Yes, this is a serious article. Cryptography often requires random numbers. From seed values to cryptographic key material to data obfuscation values to actual keys, random numbers are incredibly important. If there’s one thing that computers really suck at, it is generating random numbers. Computers are designed … Continue reading Generating Random Numbers for Cryptography with Lava Lamps
You should already realize that you cannot just change your standard encryption algorithms and key lengths on a moment’s notice. Those are decisions that you made after careful research and testing. So while you might have some cryptography in place that isn’t the latest and greatest Elliptic Curve or Quantum Cryptography fad, you’re confident that … Continue reading Exploits Against Legacy Encryption – A Conversation with Cisco
Most computer users think that when they empty the Recycle Bin, that data is gone forever. Unless the FBI or Interpol decide to use a scanning electron microscope, there’s no way someone can recover the information. Right? Wrong. That data is usually still laying around on the hard drive. Data remnants, or pieces of information … Continue reading Video – How To Erase Data Permanently in Windows with Cipher