the blog

Search

Double Whammy: Will your information be held ransom?

Have you been receiving E-Mails stating that you are about to receive a package or delivery, maybe from UPS or FedEx? Well if you do see one, just delete it. If you do open it up, PLEASE DON’T click on the link. If you do, ALLLL of your files are going to be encrypted and, unless you pay up, you will never access those files again. You are not only being attacked by malicious software (aka malware) called a Trojan, but it’s holding your information ransom as well (aka ransomware). This bad piece of software is called CRYPTLOCKER. If you activate this piece of malware, all of your local files and mounted drive files will be encrypted with an algorithm even NSA cannot crack. Therefore, the onl

How to choose the right information security conference to attend.

With all of the information security conferences that exist today - RSA, Blackhat, Defcon, Shmoocon, Infosec, etc., which one holds the most value and which one should I attend? Let’s break it down into three categories. Content. Money. Play time. With all of the information security conferences that exist today - RSA, Blackhat, Defcon, Shmoocon, Infosec, etc., which one holds the most value and which one should I attend? Let’s break it down into three categories. Content. Money. Play time. CHOOSING A CONFERENCE BASED ON CONTENT. If you are choosing one conference over another based on content, you have to think about what you want to accomplish. Get high level content or in the weeds conten