Transcription I’m Mike Danseglio, and I’m an instructor here at Interface Technical Training. One of the classes I teach here at Interface is Certified Ethical Hacking CEHv9. I Ethical hacking is a critical skill-set for anybody to have that’s in IT Security. Ethical Hacking is all about learning how hackers attack systems, how they … Continue reading CEHv9 Certified Ethical Hacking – White Hat vs. Black Hat – Why Ethical Hacking is important
This post is an excerpt from a previous webinar – Live Detailed Forensic Investigation of Malware Infection with Mike Danseglio. April 21, 2015. You can watch the replay of this webinar on our website Detailed Forensic Investigation of Malware Infections. In this webinar, Mike Danseglio setup three computers with a fresh installation of Windows 7, each … Continue reading Forensic Investigation of Malware – What’s going on Behind the Scenes
Got that call that every IT expert fears; A client succumbs to a hacking scam and wants you to make everything right. Immediately. My friend left three voice mails in a five minute period. I needed to call. A helpdesk technician had called to help with their system and everything is missing. Long time friend, … Continue reading This is NOT a Joke! Beware of IT Helpdesk Phone Scams
A former student sent me an email requesting assistance with a computer issue. Microsoft Security Essentials continued to post the message “error warning: HACKTOOL:WIN32/Keygen”. Hacktool malware was quarantined. Other symptoms started to appear. Following appropriate guidance, the student looked into the event viewer. The most often repeated error that the student noticed was “The driver … Continue reading A Malware Recovery Scenario – Hacktool
Browser toolbars are really common. You may even have one installed in your browser right now as you read this article. Whether you use Chrome, Firefox, Internet Explorer, Opera, Safari, or a less common browser, software companies make toolbars that integrate with your browser. For this context I need to define malware as undesired software … Continue reading Are Browser Toolbars Really Malware?