Archive for the “Security” Category

Historic Hacks: Vladimir Levin

by Kelly Kirkham

Today’s Historic Hack reminds us that security must cover entire operations from the ground up within organizations. Hacks can occur through other methods than the typical digital communications that we are used to hearing about in headlines. Physical and telecommunication efforts must also be protected. Today in Historic Hacks, the case of Vladimir Levin is…

Historic Hacks: How Much Do Data Breaches Cost?

by Kelly Kirkham

Throughout our series of Historic Hacks, we have often looked at the damages created by notorious hackers. From worms like Melissa to hackers like Gary McKinnon, we have hashed out the dirty deeds of these historic data breaches. However, we have yet to look closely at the aftermath of these digital messes. Today in our…

Historic Hacks: The Conficker Worm

by Kelly Kirkham

In 2008, a worm began infecting computers one at a time. While it may not have wrought the level of damage seen by some malware, The Conficker Hack meets our Historic Hack standards due to its endurance and tenacity. So in today’s installment of Historic Hacks, we will review the Conficker Worm and its replicating,…

What You Should Know About Application Layer DDoS Attacks

by Kelly Kirkham

DDoS attacks are a threat that constantly lurks beneath the surface for website administrators. We have gotten used to DDoS attacks as headline news due to the damage and downtime wrought. However, we often miss the details that might clue us in on how to avoid such attacks. Investigating the OSI Model To get a…

Historic Hacks: LulzSec

by Kelly Kirkham

In today’s edition of Historic Hacks, we will be looking at a sequence of attacks perpetrated by the group LulzSec, or Lulz Security, that occurred in 2011. The black hat hacking group claimed a variety of attacks that range from a high-profile Sony to taking the CIA website offline. Some experts claim that LulzSec helped…

Historic Hacks: Spamhaus

by Kelly Kirkham

You may have noticed that today’s Historic Hack title is a little bit different. Today we are featuring the target rather than the attacker, due to the fact that the attacker is still unknown. In this installment of Historic Hack, we will look at Spamhaus as the target of one of the biggest DDoS attacks…

Historic Hacks: Gary McKinnon

by Kelly Kirkham

In our Historic Hacks segment, we like to look back at internet events that shocked, surprised, or horrified us. Today we look at the biggest military computer hack of all time, even though it might not have occurred for the reasons you might think… Eyes on the skies We’ve all heard tales of Area 51…

SSL, TLS And Their Role In Security On The Internet

by Hayden Smith

When the internet was first devised, it was envisioned as a tool to connect universities, research establishments, and the military. As computers were so expensive at the time, the number of internet users were limited. This also meant that little emphasis was placed on public security with regard to the technologies being developed. All data…

Historic Hacks – Kevin Mitnick

by Hayden Smith

This time on historic hacks, rather than concentrating on a specific hack or piece of malware, we’ll be looking at the hacker’s profile. In this case, we’ll be looking at some of the exploits of one of the most famous hackers: Kevin Mitnick. Mitnick started hacking as a teenager. At just 13 years old, he…

What is Public Key Encryption And Why Does It Matter?

by Hayden Smith

Public key encryption is one of the most used security technologies on the internet. In this post, we provide an overview of what private key encryption is, how it works and why it’s important. How does encryption work? When using encryption, the message being sent is combined with a key in the encryption algorithm. This…

over 200,000 servers launched

and counting worldwide...