Strange folders and files appeared on my disk
I’ve noticed an increased number of people asking about strange files and folders appearing on their computer drives. Like this… These folders and files are named randomly to avoid being…
I’ve noticed an increased number of people asking about strange files and folders appearing on their computer drives. Like this… These folders and files are named randomly to avoid being…
Apparently there are a lot of newcomers to the PCI compliance business and are asking bizarre questions regarding PCI. One of the most common is if their organization is a…
A lot of people are always calling their PCI assessment an audit. However, certified public accountants (CPA) would tell them that there is a vast difference between the two. An assessment…
I have been encountering a lot of organizations that are confused about the difference between the PCI SSC’s point-to-point encryption (P2PE) certified solutions and end-to-end encryption (E2EE). This is understandable as even those…
SMTP is a service that can be found in most infrastructure penetration tests.This service can help the penetration tester to perform username enumeration via the EXPN and VRFY commands if…
A newly discovered strain of Locky ransomware has been discovered masquerading as legitimate Microsoft Word documents. via New Locky Ransomware Takes Another Turn — Dark Reading:
Veterans are perfect candidates for working in Cybersecurity, the skills and training received in the military prepares them for real-world situations that have real-world effects. Veterans are wired in "Attention to Detail", while there are many other skills…
Where do I go from here? Some prefer to stay technical others want that feeling of advancement in there careers to the old mahogany row or C-Suite as it's known…