Sep 7, 2022
Posted in blog, Information Security, New Products, Reviews
Once of the questions I often get from people that are looking to break into the cyber security field is how they can get a job in the field. I hear about struggles related to, “which role should I apply to”, “what skills/certs do I need or should obtain”, “how do I know what questions I should ask or be prepared to answer”. And I am finally glad to say I have found a new book that was released, that answers all these questions. So, if you have any of the mentioned questions listed above. This book is a must read for you!
Amazon USA: https://www.amazon.com/Hack-Cybersecurity-Interview-jumpstarting-cybersecurity/dp/1801816638/ref=sr_1_1?keywords=hack+the+cybersecurity+interview&qid=1662534007&sprefix=hack+the+c%2Caps%2C145&sr=8-1
Amazon Canada: https://www.amazon.ca/Hack-Cybersecurity-Interview-jumpstarting-cybersecurity/dp/1801816638/ref=sr_1_1?keywords=hack+the+cybersecurity+interview&qid=1662533978&sprefix=hack+the+cy%2Caps%2C131&sr=8-1
Why should you purchase this book?
The title of the book in my opinion is very accurate. This book literally teaches you how to “hack” an interview. It gives you the data and information to really succeed on a cybersecurity interview.
The book has multiple authors (Ken Underhill, Christophe Foulon, Tia Hopkins). They have done an excellent job on building out this book. I’ve been mentioning to a lot of my peers that we have needed a book that explains and prepares interview candidates with the knowledge to ace an interview. And, I think we finally have winner, and a much-needed resource that cyber security enthusiasts can utilize.
Read more of this post…….
Jul 26, 2021
Posted in blog, Information Security, Malware, mobile, security awareness
I have had this question come up quite a lot from people asking “hey, how would I know if my phone is hacked, it has been doing some weird things”.
So here is a list of items you should check to assess if your mobile phone might be compromised.
What might show my phone got hacked ?
Check Your Data Usage
Most mobile devices will let you check how much data each app has used up. For apps related to social media it would make sense for them to use up a lot of data. But if you have an app, you barely use, and you can see there is quite a lot of data usage on it. That might indicate that it has been running and sending/receiving data. Compromised apps, may tend to use more data since the attacker may be trying to send data over your phone to their own systems. A good way to measure this is to check your app data usage every month. So, you get to know what the average data usage if for each app you use.
Pop ups or Ads
This one is an obvious one, if you see random ads popping up out of no where. Or random windows pop up on your screen. There is a good chance your phone has malware, and/or an app was installed and could have full access to your mobile device. You should go through ALL your apps to see what you have running on your mobile device. If there is anything that you see which should not be running or installed. Remove the app and check to be sure it was removed with the app no longer showing up as running/installed.
Your Phone gets hot all the time
A phone gets very hot to touch when it’s running an app that takes up a lot of processing power. And, that makes your phone start to heat up. If this is happening to a point where your phone is always super hot to touch. Then chances are a malicious app is running all the time causing your phone to heat up. This is a good chance to view all apps running and see which one has been running the most. It could be an indicator that it is a malicious app and should be removed.
How did I get hacked ?
READ MORE OF THIS POST
Sep 28, 2018
Posted in blog, Breaches, Information Security
NCIX Data Breach
One of the biggest news items around recently has been the NCIX Breach. I was notified of it through a colleague prior to the media finding out about it through the following blog –> (https://www.privacyfly.com/articles/ncix_breach/). The blog details events that took place where a person uncovered hard drives left by the now bankrupt NCIX computer retailer. The warehouse housing these drives, and left over computers that belonged to NCIX were being sold off by the warehouse landlord. The information based off privacyfly’s blog seems to point towards the landlord illegally selling the data on the drives to recuperate lost rent. The big question here is how NCIX, or the team taking care of their assets after bankruptcy could allow this information to be sold. And, this also goes to show how NCIX has very weak security procedues in place to safeguard their most vital data (customer and employee data). Read The Full Post