How To Become A Hacker – CyberSecurity Careers
Netragard
by
1y ago
With Cybersecurity Career Talks Do you want to know "How To Become A Hacker" let us learn from world-renowned hackers, cybersecurity experts, social engineering experts. Adriel Desautels, Jayson E. Street and Philippe Caturegli share the mindset, training, experience and education (if any) required for a cybersecurity career. Who is a hacker? A person who finds innovative ways of solving problems. Attributes required for breaking ..read more
Visit website
What You Need to Know About Penetration Testing Liability
Netragard
by
1y ago
Penetration tests are designed to identify potential gaps in an organization’s cybersecurity. With an effective penetration test comes a variety of different risks.  Before engaging a penetration test provider, it is essential to understand the risks of penetration tests, how to minimize them, and why a good penetration testing firm will not be able to accept liability for actions performed in good faith. A Good Penetration Test Carries the ..read more
Visit website
How To Scope a Penetration Test (The Right Way)
Netragard
by
1y ago
How to Define the Scope of Your Next Pentest Engagement One of the most important factors in the success of a penetration test is its scope.  Scope limitations are an understandable and even common desire.  However, they can make the results of a pentest worse than useless by providing a false sense of security.  Read on to learn why it is important to work with and trust your pentest ..read more
Visit website
The Security Risks Behind Voting Machines & Mail-in Ballots
Netragard
by
1y ago
In recent months, the security of absentee voting, widely used due to the threat of the COVID-19 pandemic, has been called into question. But are these processes any less secure than the electronic voting systems used on a “normal” election day? Introduction to Electronic Voting System Security Electronic voting systems come in a number of different forms. At the polls, a voter may experience a few different types of voting ..read more
Visit website
Inside the 2020 Ping of Death Vulnerability
Netragard
by
1y ago
What is the 2020 Ping of Death? Ping of Death vulnerabilities are nothing new. These vulnerabilities arise from issues in memory allocation in the TCP/IP stack. If memory is improperly allocated and managed, a buffer overflow vulnerability can be created that leaves the application vulnerable to exploitation. The original Ping of Death was discovered in 1997 and was the result of an implementation error in how operating systems handled ..read more
Visit website
SolarWinds, SOX, and Corporate Responsibility for Cybersecurity
Netragard
by
1y ago
By now, most everyone has heard of the SolarWinds breach. Cybercriminals took advantage of SolarWinds’ poor cybersecurity practices to gain access to their network and implant malicious code within updates to their Orion network monitoring solution. This Orion solution is widely used, and its compromise led to the attackers gaining access to the networks of many large enterprises and a significant percentage of US government agencies. As a result ..read more
Visit website
Embedded Device Security Research: AXON Body 2 – Body Worn Cameras
Netragard
by
1y ago
Introduction Netragard performs regular vulnerability research against software and hardware. While most of this research is customer confidential, some of the research is intended for disclosure. The focus of our research for this article was the AXON Body 2 Worn Camera which plays a critical role in protecting civilians and police officers. Due to the sensitive nature of the evidence collected by the AXON Body 2 it is particularly ..read more
Visit website
AI Series Part 1: Introduction to the Modern Threats of AI
Netragard
by
1y ago
This is the first post in a series discussing AI and its impacts on modern life. Artificial Intelligence is useful, powerful, and dangerous when used irresponsibly. Its being leveraged by a wide variety of industries including but not limited to social media, defense contractors and information security companies. Some of the dangers created by the use of AI are overt while others are very subtle. For example, the ongoing ..read more
Visit website
AI Series Part 2: Social Media and the Rise of “Echo Chambers”
Netragard
by
1y ago
This is the second post in a series discussing AI and its impacts on modern life. In this article, we’ll explore how AI is used in social media and the ramifications of training AI while defining “success” based upon the “wrong” metrics. Social Media Is not Free Social media platforms that offer “free” services aren’t actually free. These companies need to make a profit and pay their staff, so ..read more
Visit website
How to protect against the Modern Ransomware Attack
Netragard
by
1y ago
In 2019, over half of businesses were the victims of ransomware attacks with an average cost of $761,106. In 2020, attacks grew even worse with an estimated total price tag of $20 billion. Successful ransomware attacks are growing increasingly common despite the dozens of solutions that claim to provide 100% protection against ransomware. So, what’s going wrong? Ransomware “Solutions” Aren’t Working Most companies are aware of the threat of ..read more
Visit website

Follow Netragard on Feedspot

Continue with Google
OR