Latest Tip:
License to Hack (7/3/2017)
This tip is a peek into the world of security research and bounty programs.
Past Tips:
Pros & Cons (6/5/2017)
Conventions are abundant in the cybersecurity world, and have a great deal of value for students and professionals alike.
There’s No Place Like Homelab (5/15/2017)
Summer is coming, which means school is wrapping up for many students. Now is a good time to think about how to keep skills sharp (and have some fun) over the summer—with a homelab!
Biometrics & You (5/8/2017)
Biometrics as a form of authentication—in other words, using fingerprint or other biological characteristics as proof of identity—is increasingly used in the security world. The technology can be used as a standalone authentication method, or as part of a 2FA (2-factor authentication).
Self Study (4/24/2017)
So you are interested in Cybersecurity (or even networking in general). The field is pretty broad, and as IT permeates every aspect of our society that trend will continue. Application development security, exploit writing, identity management, Linux sysadmin—the options are myriad. How do you know where to start? How do you know what aspect best suits you?
The Value of VPN (4/17/2017)
The roll back of privacy protections blocking ISPs from selling data to advertisers is big news right now; because of this many people are seeking out a VPN solution. Is a VPN right for you and what provider should you use?
Pwn2Own Hacked even Chrome (4/3/2017)
It feels as if everyday a new threat appears in the world of cyber security.
Industry Groups & Associations (3/27/2017)
While there is an abundance of resources out on the internet, nothing can beat being in the room with others who share your passion for IT in general, and cybersecurity in particular. Here is a (by no means exhaustive) list of associations and organizations that have presence in Southeastern Wisconsin and are available to students, industry professionals, or both.
Anatomy of a URL (3/13/2017)
It’s safe to say that one hundred percent of college students in the US utilize the internet in one way or another. Most of us just zip to google and type in “YouTube” or “Facebook” and we are then taken to that website, blissfully unaware of how a URL actually works—or what it even is.
Snapping over Visio? (3/6/2017)
Securing a network requires knowing the architecture and systems of your environment. One of the best ways to visually represent your network is a logical or physical topology. Unfortunately creating such topologies can be a painful process in most applications (Word, Photoshop, etc).
Universal Plug and Play (2/27/2017)
With ‘Play’ in the title, it has to be a good thing, right?
Internet of Things (2/20/2017)
Smart Devices are often filled with vulnerabilities. Here are a few flaws to be on the lookout for:
Why are Flash and Java so Vulnerable? (2/13/2017)
We’ve all heard that it’s important to keep your operating system and programs updated, and often these two—Flash and Java—are called out as being extra important because of how often issues are discovered and exploited by hackers. What is it that makes these two so vulnerable?
Ransomware – Digital Extortion? (2/6/2017)
In the computer virus world ransomware has exploded in popularity, becoming the number one type of malware as of early 2016, and it has only grown since. What exactly is it?
Train & Hone Your Skills Online (1/30/2017)
Cybersecurity is a field that spans many skillsets. Here is a list of a few resources to sharpen those skills.
(more…)Data Privacy Day (1/23/2017)
Every January 28th is celebrated as Data Privacy Day (DPD) and is an international effort to promote data privacy for users and businesses.
(more…)What is Cybersecurity Anyway? (12/19/2016)
It’s a term being thrown around a lot lately. Is it ‘Cyber Security’? Cybersecurity? Cyber-security?
Disable Flash (12/12/2016)
Now is the time to disable or uninstall Flash!