How to Start Your Career in Cyber Security PIII (The Cyber Underground)
What are some of the keys to success when starting a career cyber security? When starting on your journey to begin a successful career in cyber security, you’ll need actual hands-on experience. If you’re taking courses at a college, make sure that institution requires at least one internship. This experience adds tremendous credibility to the […]
Hacker Societies (The Cyber Underground)
How to join a hacker society and not get arrested How can you join a hacker society and learn how to hack networks, computers, and people without breaking the law? Join us on The Cyber Underground for an interview with the Max Rieta, President of the Hawaii Advanced Technology Society (HATS), University of Hawai’i Kapi’olani […]
Separation of Families (The Cyber Underground)
Technological Solutions to Reuniting Families Dave Stevens hosts Jay Fidell as they talk about technological approaches to family separation for individuals deported from the United States. They also cover phishing and advancing technological security methods. The host for this episode is Dave Stevens. The guest for this episode is Jay Fidell. ThinkTech Hawaii streams live […]
Russian Hacking Motivations and Outcomes (The Cyber Underground)
What are the Russians after? What’s their end-game? Hackers have a wide range of motivations and desired outcomes when they attack. Their reasons can include hacktivisim, corporate espionage, state-sponsored attacks (like Russia, China, and North Korea), cyber crime (drugs, ransomeware, human trafficking), Search Engine Optimization (SEO – spamdexing), and the list goes on! What are […]
Red Hen Attack! Spamdexing! (The Cyber Underground)
What is The Red Hen and why was it attacked? In this episode Dave Stevens and co-host Hal Cocoran talk about the Red Hen Restaurant, which recently made news by refusing service to White House press secretary Sarah Hucka-Sanders, and how it was the victim of a cyberattack. The host for this episode is Dave […]
How to Secure Your Home Router (The Cyber Underground)
Harden your network by securing your Internet router! With North Korea, Russia, and China still attacking Small Office / Home Office (SOHO) networking equipment around the world, we need to become harder targets to avoid being victims. In this episode of The Cyber Underground we discuss how to configure your home WiFi / Internet router […]
North Korea Is Still Attacking Us! (The Cyber Underground)
The June Summit with President Trump and Kim Jong Un might have helped calm nuclear nerves. But that hasn’t stopped North Korea’s cyber attacks on the United States. The U.S. Government refers to malicious cyber activity by the North Korean government as HIDDEN COBRA, and they’re back at it with TYPEFRAME, which consists of Windows […]
GDPR – Why us, Why here? (The Cyber Underground)
Are local companies affected? What if I don’t get paid for my service? What’s the penalty for non-compliance? Will this help? Is it going to get worse? What made this happen? How long did it take to come up with the GDPR? What should we do? Will there be a version 2.0? Do I need […]
Alexa Recording Your Conversation (The Cyber Underground)
Oregon news KIRO-TV reported a Portland family contacted Amazon to investigate after they say a private conversation in their home was recorded by Amazon’s Alexa — the voice-controlled smart speaker — and that the recorded audio was sent to the phone of a random person in Seattle, who was in the family’s contact list. This […]
Open Source Intelligence OSINT (The Cyber Underground)
Open-source intelligence (OSINT) is defined by the U.S. Intelligence Community as information that is publicly available and gathered from radio, television, newspapers, commercial databases, electronic mail, or portable electronic media. OSINT is tremendously useful when hackers need to gather the names and biographical information of relevant employees (CEO, CFO, accounts receivable and payable, etc.), in […]