Parental Controls

Kids are growing up with technology all around them, in some cases, the kids are better at using the devices than the adults. This leads to children having full access to the uncensored internet. The internet is a great tool for learning when you find quality content that has reasonable Read more

TCP Wrappers

TCP Wrappers is a host-based ACL system, they are used to limit network access to specific IP addresses. They work on Unix based operating systems like Linux and BSD. The original code was written by Wietse Venema in 1990 to monitor an unauthorized users activities on a Unix operating system Read more

2019 Cyber News Review

The 2019 Cyber News Review started in April 2019 and provides a weekly review of Cyber Security news. 4/18/2019 Chinese hackers strike US universities in bid for military technology Accenture’s iDefense team has confirmed cyberattacks against at least 27 universities worldwide. “It is believed that the threat actors behind the Read more

Account Security

rsonally. When a data breach occurs in an organization that holds your information, those details/that data could be swiped and used for malicious purposes. That data can include your social security number, credit card information, private health information, account details, username and password, and much more. Many people are still Read more

Cyber Awareness Month

October is National Cyber Security Awareness month, or NCSAM for short. It was launched by the National Cyber Security Alliance & the U.S. Department of Homeland Security in October 2004. Its purpose is to provide Americans with information to keep them safe while browsing the internet and using electronic devices. Read more

Sim Swapping

When hackers cannot break into your accounts by pressing buttons, they usually rely on tricking a human to help them get in. Sim Swapping is a new attack where a hacker will trick your cell phone provider to activate your cell phone number on the hacker’s phone. This allows them Read more

Supply Chain Attacks

As more and more organizations secure their users, networks, and systems, attackers are finding more creative ways to access sensitive data. The supply chain attack in cyber security is one of these methods; it’s affecting not only organizations but average users as well. In a supply chain attack, cyber criminals Read more