security

Password Security Measures

Passwords have been around since the dawn of the computer age and they remain the primary means of protecting online accounts and personal information. As the number of online transactions and data breaches continue to increase, it is more important than ever to choose and use strong passwords. A strong password is a combination of …

Password Security Measures Read More »

What is Cybersecurity Risk?

According to NIST SP 800-60 volume 1 revision 1, Cybersecurity risks relate to the loss of confidentiality, integrity, or availability of information, data, or information (or control) systems and reflect the potential adverse impacts on organizational operations (i.e., mission, functions, image, or reputation) and assets, individuals, other organizations, and the Nation. Cybersecurity risk is the probability of exposure, …

What is Cybersecurity Risk? Read More »

What is a DMZ Network?

In network security, a demilitarized zone (DMZ) functions as a subnetwork on an organization’s network infrastructure that is located between the protected internal network and an untrusted network often the internet. The DMZ is designed where there is one inside interface connected to the private network, and one outside interface connected to the public network. …

What is a DMZ Network? Read More »

Personally Identifiable Information (PII)

What is PII? The Nation Institute of Standard and Technology (NIST), defines personally identifiable information (PII) as Any information about an individual maintained by an agency, including any information that can be used to distinguish or trace an individual’s identity, such as name, social security number, date and place of birth, mother‘s maiden name, or …

Personally Identifiable Information (PII) Read More »

T-Mobile Data Breach, Over 40 Million People Affected

A cyberattack on T-Mobile has exposed the information of over 40 million people. In a statement issued by the organization, that it had been investigating the data breach since last week when it was “informed of claims made in an online forum that a bad actor had compromised T-Mobile systems.” The company said the stolen files …

T-Mobile Data Breach, Over 40 Million People Affected Read More »

What is OWASP?

The Open Web Application Security Project (OWASP) is a non-profit organization focused on improving the safety of software. It was founded in 2001 by Mark Curphey. OWASP features a range of tools it uses, methodologies, and libraries to see web application security to seek out security vulnerabilities in web applications. They even have documentation guidelines …

What is OWASP? Read More »

What is Maltego CaseFile?

Maltego CaseFile is employed for offline intelligence problem-solving. It had been born as a result of Maltego users using the tool to do offline intelligence investigations. These users are not using the Transforms available in Maltego. CaseFile is a visual intelligence application that can be used to determine the relationships and real-world links between hundreds …

What is Maltego CaseFile? Read More »

Spyware

Spyware is a type of malware or malicious software that is installed on a computing device without the end user’s knowledge. It can also be classified as any program that gathers your personal information and sends it to a third party. Spyware is controversial because, even when it is installed for safety reasons, it can …

Spyware Read More »

The US, 6 Other Countries in new call for backdoor encryption access

On the 13th October 2020, the US Division of Justice signed on to a new worldwide assertion warning of the hazards of encryption and calling for an industry-wide effort to allow law enforcement agencies to access encrypted information as soon as a warrant has been obtained. The US was joined in the effort by the …

The US, 6 Other Countries in new call for backdoor encryption access Read More »