Hackers Shake Web to Core

High level Information Assurance training and certification is available at CED Solutions. [singlepic id=833 w=320 h=240 float=right]By Byron Acohido USA TODAY The keepers of the Internet have become acutely concerned about their ability to protect the most sensitive personal information such as account logons and credit card numbers. Hackers cracked three companies that work with the most popular Web browsers to ensure the authenticity of Web pages where consumers type in sensitive information. The hacked firms are among more than 650 digital certificate authorities [...]

Read more...

5 Tech Tools To Keep You Safe at College or Home

[singlepic id=44 w=320 h=240 float=right]Summer is coming to an end. And for most college-bound students that means you’re heading back to the dorms. According to the most recent U.S crime statistics there were about 4700 robberies, 5000 aggravated assaults, 3300 forcible sex offences and 31 murders on college campuses in 2009. So while students and parents pack up their caravans with X-long twin bedding and plastic storage boxes don’t forget to include these new high tech tools to keep you and your [...]

Read more...

U.S. Cybercops Caught Flat-Footed by Massive Global Cyberattack

[singlepic id=36 w=320 h=240 float=right] Top U.S. cybercops were surprised by revelations of an unprecedented case of cyber-espionage — a five-year-long hacking scheme from a single “state actor” that targeted U.S. government and U.N. computers as well as defense firms and private industries. The spying was dubbed “Operation Shady RAT” by security firm McAfee, which uncovered the hacking — and it led to a massive loss of information that poses a huge economic threat, security experts say. CED Solutions provides security training classes [...]

Read more...

How Hackers Stole 24,000 Files From The Pentagon

[singlepic id=835 w=320 h=240 float=right]Are all of your desktops, servers, LAN’s and WAN’s protected from outside hacking attacks?  We can help prevent the following. We’re all human, you know? That’s roughly the trick that the hackers most likely relied on when, earlier this year, they managed to steal over 24,000 files from a defense contractor. The Pentagon won’t say what files went astray, or the level of secrecy associated with the contents of the stolen data. But we can assume that [...]

Read more...

Business Is Booming – For CyberCrooks, That Is

[singlepic id=828 w=320 h=240 float=right]The latest get rich quick scheme to hit the net? Hacking — and it actually pays. Are you prepared for potential hackers trying to obtain your data?  Learn how to protect your systems by taking the Computer Ethical Hacking course at CED Solutions.  The course is all hands on with hundreds of tools, evaluations of what areas of risk exist. If CyberCrooks do get in to your systems, what did they see, what did they copy, what [...]

Read more...