We shouldn’t be surprised that organisations like the CIA are using technology to monitor people of interest to them, but the weaknesses they knowingly leave behind are a big concern. This week, along with other students at the SANS Cyber Retraining Academy, I completed two capture the flag challenges. I worked as part of a […]
I used the Metasploit Framework to take control of a virtual machine for the first time this week. If I can do that after just six weeks of training (albeit with a little help), I hate to imagine what an experienced hacking expert is capable of doing to an improperly secured computer… A couple of […]
At the beginning of this year I embarked upon a new adventure in cyber security with the government-backed SANS Cyber Retraining Academy. At the end of week five – the course’s halfway point – I figured it was time for an update on how things are going. If I were to describe the experience so far […]
Since starting my cyber security course, I’ve fallen in love with Linux. It’s light, it’s fast, and it’s free – and the Elementary OS distro brings all of that together with some great-looking design, seemingly inspired by macOS. Unfortunately, it’s not a walk in the park to install on a Mac. First, let me set […]
When you think of a hacker, what do you picture? As someone who grew up in the ’90s, my go-to mental image was always Boris Grishenko, the bespectacled computer technician from 1995’s James Bond film GoldenEye, known for his catchphrase, “I am invincible!” Things have only slightly changed 22 years later. Sure, the stereotypical hacker of […]
Every Windows user knows it’s foolish to use their computer without installing anti-virus software, but there’s some complacency among users of other operating systems that’s putting them, their data and their money at risk. It’s time they rejoined reality and protected themselves.