Saturday , September 22 2018
Home / IT Security / Black Hat (page 4)

Black Hat

Bluetooth Threats

Bluetooth Threats

Bluetooth Threats: Much like Wi-Fi, Bluetooth has a bevy of threats facing it that you must take into account. Bluetooth suffers from many shortcomings that have been slowly addressed with each successive version, but many flaws remain and can be exploited. The technology has already seen many attacks take their …

Read More »

Hacking Bluetooth

Hacking Bluetooth

Hacking Bluetooth: Another wireless technology to consider is Bluetooth, which is seen in many mobile devices in today’s marketplace. Bluetooth refers to a short-range wireless technology commonly used to connect devices such as headsets, media players, and other types of technologies. Bluetooth operates in the 2.4 GHz frequency range and …

Read More »

Working with Email

Working with Email

Working with Email: Email is one of the tools that a business relies on today to get its mission done. Without email many businesses would have serious trouble functioning in anything approaching a normal manner. The contents of email are staggering and can be extremely valuable to an attacker looking …

Read More »

The Value of Job Sites

The Value of Job Sites

The Value of Job Sites: An oft-overlooked but valuable method of gathering information about a target is through job sites and job postings. If you have every looked at a job posting, as many of us have, you will notice that they can take a lot of forms, but something …

Read More »

Malicious Add-Ons

Malicious Add-Ons

Malicious Add-Ons: There are any numbers of add-ons that have the potential to harm a system. Some do so unintentionally through poor programming, and some are truly malicious add-ons; the difference between them is intent. Consider a Java applet, for example. This is a small, self-contained Java Script that is …

Read More »

The Patriot Act

The Patriot Act

The Uniting and Strengthening America by Providing Appropriate Tools Required to Intercept and Obstruct Terrorism (USA PATRIOT) Act of 2001 was passed largely because of the World Trade Center attack on September 11, 2001. This law gives the U.S government extreme latitude in pursuing criminals who commit terrorist acts. The …

Read More »

The Computer Security Act of 1987

The Computer Security Act requires federal agencies to identify and protect computer systems that contain sensitive information. This law requires agencies that keep sensitive information to conduct regular training and audits and to implement procedures to protect privacy. All federal agencies must comply with this act. Note: For more information …

Read More »

The Cyberspace Electronic Security Act

The Cyberspace Electronic Security Act

The Cyberspace Electronic Security Act (CESA) was passed in 1999, and it gives law enforcement the right to gain access to encryption keys and cryptography methods. The initial version of this act allowed federal law enforcement agencies to secretly use monitoring, electronic capturing equipment, and other technologies to access and …

Read More »

The Family Educational Rights and Privacy Act

The Family Educational Rights and Privacy Act

The Family Educational Rights and Privacy Act (FERPA) dictates that educational institutions may not release information to unauthorized parties without the express permission of the student or, in the case of a minor, the parents of the student. This act also requires that educational institutions must disclose any records kept …

Read More »

The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act

The Computer Fraud and Abuse Act (CFAA) went into a law in 1986. The original law as introduced to address issues of fraud and abuse that weren’t well covered under existing statues. The law was updated inn 1994, in 1996, and again in 2001. This act gives federal authorities, primarily …

Read More »