Cybersecurity

What are Rogue Access Points?

WiFi is commonly used both within organizations and in the general public. In recent years attackers have discovered ways...

Oct 11 · 1 min read >
rogue access points

Installing Wireshark on Mac OS X (Yosemite)

Wireshark is a software application for protocol and network traffic analysis, also known as a network sniffer. The application...

Sep 18 · 1 min read >
Wireshark mac os x yosemite

TCP Congestion Control

So it’s that time of year again where I decided to enroll in another Cybersecurity class at UMUC. I...

Sep 18 · 1 min read >
TCP Congestion Control

Web Application Database Vulnerabilities to be Aware of

The use of malicious code attacks against web applications and more specifically, web enabled databases, is on the rise...

Nov 1 · 1 min read >
Web Application Database Vulnerabilities

SQL Injection Explained

SQL injection has been a method of attacking databases through multiple tiers of application infrastructure for many years, MacVittie...

Oct 29 · 1 min read >
SQL Injection

Operating Systems Security: Protection Measures Analysis

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and...

Oct 25 · 12 min read >
Operating Systems Security

Usable Security? User Friendly Factors

In his article on usable security, Lampson (2009) asserts that usable security needs to begin with policy and how...

Oct 12 · 1 min read >
Usable Security

Post Authentication Methods

A lot of time can be spent in an organization firming up authentication and access control systems to ensure...

Oct 8 · 1 min read >
Post Authentication Methods

Freedom of Information Act (FOIA) Quick Overview

Lately I’ve been carrying out some work involving the Freedom of Information Act (FOIA). There is tons of information...

May 10 · 2 min read >
Freedom of Information Act