search
top

Hack The Cybersecurity Interview – Book Review

Once of the questions I often get from people that are looking to break into the cyber security field is how they can get a job in the field. I hear about struggles related to, “which role should I apply to”, “what skills/certs do I need or should obtain”, “how do I know what questions I should ask or be prepared to answer”. And I am finally glad to say I have found a new book that was released, that answers all these questions. So, if you have any of the mentioned questions listed above. This book is a must read for you!

Amazon USA: https://www.amazon.com/Hack-Cybersecurity-Interview-jumpstarting-cybersecurity/dp/1801816638/ref=sr_1_1?keywords=hack+the+cybersecurity+interview&qid=1662534007&sprefix=hack+the+c%2Caps%2C145&sr=8-1

Amazon Canada: https://www.amazon.ca/Hack-Cybersecurity-Interview-jumpstarting-cybersecurity/dp/1801816638/ref=sr_1_1?keywords=hack+the+cybersecurity+interview&qid=1662533978&sprefix=hack+the+cy%2Caps%2C131&sr=8-1

Why should you purchase this book?

The title of the book in my opinion is very accurate. This book literally teaches you how to “hack” an interview. It gives you the data and information to really succeed on a cybersecurity interview.

The book has multiple authors (Ken Underhill, Christophe Foulon, Tia Hopkins). They have done an excellent job on building out this book. I’ve been mentioning to a lot of my peers that we have needed a book that explains and prepares interview candidates with the knowledge to ace an interview. And, I think we finally have winner, and a much-needed resource that cyber security enthusiasts can utilize.

Read more of this post…….

Podcast Episode 3 – Learning about purple teaming



Guest Speaker: Maril Vernon

Check out our podcast episode from any of the podcast links below:


Spotify: https://open.spotify.com/show/6KP2Z46VRkl5GJ4ivbIpCl

Apple Podcasts: https://podcasts.apple.com/ca/podcast/stealthbay/id1574821334

Google Podcast: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy82MTkzMTRlYy9wb2RjYXN0L3Jzcw==

RadioPublic: https://radiopublic.com/stealthbay-6vkBo1

PocketCasts: https://pca.st/evsg4l7l

Stitcher: https://www.stitcher.com/show/stealthbay

Castbox: https://castbox.fm/channel/StealthBay-id4410602

Podcast Episode 2 – Cyber Security for Smart Cars & Automotive Industry

Guest Speaker: Kamel Ghali

Check out our very first podcast episode from any of the podcast links below:


Spotify: https://open.spotify.com/show/6KP2Z46VRkl5GJ4ivbIpCl

Apple Podcasts: https://podcasts.apple.com/ca/podcast/stealthbay/id1574821334

Google Podcast: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy82MTkzMTRlYy9wb2RjYXN0L3Jzcw==

Youtube (Condensed version): https://youtu.be/5OLVbjfVyj4

IHeartRadio: https://iheart.com/podcast/84474188/

Breaker: https://www.breaker.audio/stealthbay

RadioPublic: https://radiopublic.com/stealthbay-6vkBo1

PocketCasts: https://pca.st/evsg4l7l

Stitcher: https://www.stitcher.com/show/stealthbay

Castbox: https://castbox.fm/channel/StealthBay-id4410602

How to find out if your phone is hacked

I have had this question come up quite a lot from people asking “hey, how would I know if my phone is hacked, it has been doing some weird things”.

So here is a list of items you should check to assess if your mobile phone might be compromised.

What might show my phone got hacked ?

Check Your Data Usage

Most mobile devices will let you check how much data each app has used up. For apps related to social media it would make sense for them to use up a lot of data. But if you have an app, you barely use, and you can see there is quite a lot of data usage on it. That might indicate that it has been running and sending/receiving data. Compromised apps, may tend to use more data since the attacker may be trying to send data over your phone to their own systems. A good way to measure this is to check your app data usage every month. So, you get to know what the average data usage if for each app you use.

Pop ups or Ads

This one is an obvious one, if you see random ads popping up out of no where. Or random windows pop up on your screen. There is a good chance your phone has malware, and/or an app was installed and could have full access to your mobile device. You should go through ALL your apps to see what you have running on your mobile device. If there is anything that you see which should not be running or installed. Remove the app and check to be sure it was removed with the app no longer showing up as running/installed.

Your Phone gets hot all the time

A phone gets very hot to touch when it’s running an app that takes up a lot of processing power. And, that makes your phone start to heat up. If this is happening to a point where your phone is always super hot to touch. Then chances are a malicious app is running all the time causing your phone to heat up. This is a good chance to view all apps running and see which one has been running the most. It could be an indicator that it is a malicious app and should be removed.

How did I get hacked ?

READ MORE OF THIS POST

NCIX Data Breach

NCIX Data Breach

One of the biggest news items around recently has been the NCIX Breach. I was notified of it through a colleague prior to the media finding out about it through the following blog –> (https://www.privacyfly.com/articles/ncix_breach/). The blog details events that took place where a person uncovered hard drives left by the now bankrupt NCIX computer retailer. The warehouse housing these drives, and left over computers that belonged to NCIX were being sold off by the warehouse landlord. The information based off privacyfly’s blog seems to point towards the landlord illegally selling the data on the drives to recuperate lost rent. The big question here is how NCIX, or the team taking care of their assets after bankruptcy could allow this information to be sold. And, this also goes to show how NCIX has very weak security procedues in place to safeguard their most vital data (customer and employee data). Read The Full Post

« Previous Entries

top