Android Nougat Encryption
Here are a few articles on the Android Nougat OS encryption including a comparison of encryption options on the iPhone. It is not enough...
Backdoors Found in Barracuda Gear
EndFragment"Even the biggest companies can have flaws that are so simply dumb that it just might be the one move to bring the company to...
TU Security is Everyone's Responsibility
Discussion is every IT job a cyber security job? Do we need to change the way people think about cyber security when it comes to career...
Cybersecurity Workforce and Career Tools
StartFragment The NICE Program Office is pleased to announce that the NIST Special Publication 800-181: The NICE Cybersecurity Workforce...
Worlds Largest Data Breaches Active Info-graphic
Here is an awesome visual graphic of the time and size of data breaches going back to 2004. It is an interactive graphic that you can...
TU DDoS and IoT
On 21 OCT 2016 one of the largest scale Distributed Denial of Service (DDoS) attacks was launched against US based websites. One of the...
Insecure OS X
A well-known security hole in later versions of Apple OSX allows users to boot into recovery mode and reset the admin or root password. ...
Private Mode not so Private
Many network students know that IPv4 has a limited number of addresses available for use on the Internet. To remedy the situation, three...
Online Reputation
Today two things people should concern themselves about is their online profile and online reputation. Both to a large extent can be...
What is a Distributed Denial of Service (DDoS) Attack
Today there has been a major distributed denial of service (DDoS) attack on the internet. Targeting specifically the DNS (domain naming...