Why is collaboration important? I once worked someplace that had collaboration as a core value, but not all of its employees collaborated. So I learned first hand why collaboration is important. It’s one of the best ways to be successful without making enemies.
I’m a security professional by trade. Security professionals are notoriously bad at collaborating. Collaboration may be the only thing I do better than other security professionals I’ve met, so I see the importance of it. And not just in security, and not just in IT.
Brute force hacking is a crude form of hacking by guessing passwords over and over again until you guess right. As you may guess, it can be rather time consuming. But there are more than 40 gigabytes’ worth of stolen usernames and passwords in circulation that we know about, so obviously, it works.
In computing in general, brute force refers to getting something done inelegantly, relying on persistence and the computer’s ability to repeat things over and over quickly until it’s successful. Here’s how brute force hacking works, and some ways to prevent it.
What is geolocation? It’s the practice, or some would say black magic, of inferring your geographic location from your computer, phone, or another device. It has legitimate uses, but also can arguably be an invasion of privacy. Here’s how it works, and how to defeat it.
In a nutshell, it works like algebra, where you solve something you don’t know based on two or more things you do know.
How good is my password? Chances are, not as good as the web site’s strength-o-meter says it is. That’s assuming the site even has a strength-o-meter. Unfortunately, more goes into the quality of a password than just the things the typical web site strength-o-meter measures. Here’s what you need to know, and what you can do about it.
Chromebooks are a popular solution for people who primarily use computers to go online, for students, and for security professionals. They are inexpensive, reliable, and secure. But since security is a big motivator behind Chromebooks, that raises a question: Do Chromebooks need antivirus protection?
A frequent question people ask me, as a security professional, is why do hackers hack? The answer used to vary, but today they typically hack for the same reason I do. To make money. The difference is who pays them. Well, and that little detail called permission, of course.
Vulnerability scanning is an essential part of any information security program. Unfortunately it’s also pretty widely misunderstood. In that light, let’s take a look at what a vulnerability scanner is, and how a vulnerability scanner works.