View Post

Hacktivism, Anonymous, and the Bureau of Justice Statistics

In Cybersecurity by Ian0 Comments

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.

Share
View Post

Hacking as an Addiction

In Cybersecurity by Ian0 Comments

This entry is part 12 of 18 in the series Human Aspects in Cybersecurity

This entry is part 12 of 18 in the series Human Aspects in CybersecurityHacking can be broken into several categories, including criminal hacking where the perpetrator is motivated by some tangible gain, usually monetary.  There are other forms of hacking which are driven by other factors such as political reasons. 

Share
View Post

Drupal Ladder

In Web Development by Ian0 Comments

Last week I attended my first Drupal ‘learn sprint’.  For anyone interested in contributing to the Drupal community, learn sprints are a great way to network with other professionals in the area while learning how you can contribute to Drupal.

Share
View Post

Will the Mandiant Report Raise Public Awareness?

In Cybersecurity by Ian0 Comments

This entry is part 9 of 18 in the series Human Aspects in Cybersecurity

This entry is part 9 of 18 in the series Human Aspects in CybersecurityThe Mandiant report: APT1: Exposing One of China’s Cyber Espionage Units, has stirred up a lot of media attention over the past few weeks.  The report was originally released to show evidence that a specific Chinese military unit has been behind many major Advanced Persistent Threats (APTs) within the …

Share
View Post

Mobile Security

In Cybersecurity by Ian0 Comments

This entry is part 8 of 18 in the series Human Aspects in Cybersecurity

This entry is part 8 of 18 in the series Human Aspects in CybersecurityUnderlying vulnerabilities in mobile device software has also opened up the door to potential security breaches.  In an article describing mobile application security flaws, (Westervelt, 2010) wrote that it was discovered that many mobile application security vulnerabilities were similar to those found in early web applications.

Share