Posts Tagged end user security

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here

Biometrics: Not the Promised Silver Bullet

Biometrics: Not the Promised Silver Bullet

Remembering passwords has become a necessary annoyance in the Digital Age. We resort to using birth dates, pets’ and children’s names, and easily-remembered numeric sequences like ‘1234’ or ‘666’ (if you have a Satanic bent). The more creative among us will combine the aforementioned strategies into passwords

Read more

Big Mac Attack: Is the Apple Macintosh Virus-Proof?

Big Mac Attack: Is the Apple Macintosh Virus-Proof?

The age-old battle of supremacy between PC and Mac users dates back to the introduction of the first Mac back in 1984. I jumped on the Apple bandwagon back then with a purchase of the original Mac 128k machine. I loved it and the MS DOS machines

Read more

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

  This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popular #PDF converter software. We discuss what happened, how Software Restriction Policy in Windows kept him safe from a potential malware

Read more

Mobile Malware Now Equals PC Infection Rates

Mobile Malware Now Equals PC Infection Rates

There are currently 2 billion smartphone users in the world. These users have amassed over 268 million downloads. It should then come as little surprise that cybercriminals have turned their attention to attacking mobile devices and the users to which they’re attached. Mobile devices infected with malware

Read more

Insider Threat Management

Insider Threat Management

A DOE contractor feeling the pressures of rising debt attempted to sell stolen uranium parts to agents of a foreign government. A government researcher who experienced a hostile work environment accessed a secured facility and intentionally left 4,000 biological samples to thaw resulting in a $500,000 loss

Read more

Counterfeit Mobile Shopping Apps Steal Christmas 2016

Counterfeit Mobile Shopping Apps Steal Christmas 2016

Each holiday shopping season has a must-have gift item. Holidays past had their Cabbage Patch Kids, Mighty Morphin Power Rangers, and Legos as perennial favorites. Holiday 2016 is shaping up to have several contenders, but no clear favorite has yet emerged. At least Pokemon characters are in

Read more

Computer Forensics and the Hillary Clinton Email Case

Computer Forensics and the Hillary Clinton Email Case

I thought it might be both interesting and challenging to examine the recent revelation about the newly discovered emails on Anthony Weiner’s laptop. Emails that the FBI feels may be pertinent to the Hillary Clinton Email case. It should be an Interesting topic for Cybrarians taking any

Read more

[podcast] Kim Green, on CISO-aaS, the Redskins Laptop, and HIPAA

  We are pleased to introduce Ms. Kim Green (Twitter: @kim1green). She is the CEO of KAZO Security, as well as the CISO / CPO of Zephyr Health, a #SaaS based #Healthcare data #analytics company.  She brings over 20 years of experience in healthcare and leadership to

Read more

[podcast] Earl Carter dissects the Angler Exploit Kit

[podcast] Earl Carter dissects the Angler Exploit Kit

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off with a history or where it came from

Read more

[podcast] Software Restriction Policies and Applocker

[podcast] Software Restriction Policies and Applocker

Windows has all the tools you need to secure an OS, but we rarely use them.  One example of this is ‘Software restriction policies’ or the use of Windows Applocker. It assists IT organizations by allowing you to block certain files from being saved anywhere, what file

Read more
Page 2 of 3123

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel