The Cyber Underground
Open-source intelligence (OSINT) is defined by the U.S. Intelligence Community as information that is publicly available and gathered from radio, television, newspapers, commercial databases, electronic mail, or portable electronic media. OSINT is tremendously useful when hackers need to gather the names and biographical information of relevant employees (CEO, CFO, accounts receivable and payable, etc.), in […]
Law Enforcement Is Now Using Available Online Genetic Information (The Cyber Underground)
The Golden State Killer committed more than 50 rapes and 12 murders in California from 1976 to 1986 before law enforcement used cellphone records or big data to solve crimes. Recently, investigators in California used DNA from crime scenes and plugged the genetic profile into a commercially available online genealogy database. They found distant relatives […]
How to start a Career in Cyber Security part II (The Cyber Underground)
The cyber security field is a high in-demand & financially lucrative career. What path could you take to get your foot in the door and start your career? Education, training, earning certifications, in-person networking, self-directed learning are a few key ways to get you moving in your cyber security career journey. The host for this […]
How to Secure Your Home Network (The Cyber Underground)
In this episode of The Cyber Underground, Hal Corcoran joins Dave Stevens to discuss the number of consumer home network devices on the market, their ease of setup, and the actually level of security they provide.The host for this episode was Dave Stevens. The guest for this episode was Hal Corcoran. ThinkTech Hawaii streams live […]
So You Want to be a Hacker (The Cyber Underground)
This week on The Cyber Underground, Dave Stevens and Andrew Lanning discuss what it takes to become a hacker. They’ll take a closer look at what kind of person becomes a hacker? Is there a personality type? Where do they get started? How do they learn the skills? How do they decide between black and […]
FBI Alert! Tech Support Fraud! (The Cyber Underground)
Tech support fraud involves a criminal claiming to provide customer, security, or technical support in an effort to defraud unwitting individuals. This type of fraud continues to be a problematic and widespread scam. Stanley Lau (CEO of Hawaii Tech Support) and Tim Ames (CTO Hawaii Tech Support) join Dave Stevens the Cyber guy and Andrew […]
Getting to know a Pen Tester (The Cyber Underground)
Thought of being a pentester, but what does it take to be a pentester? Why is penetration testing important in the IT industry? KMPG Hawaii along with HATS & ITMA student club organizations hosting a penetration testing event lead by Orlando Galindo during spring break. April 7th Community Tech Fair at Kapiolani Community College a […]
Russian Cyber Attacks on U S Power Plants! (The Cyber Underground)
Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) issued an alert containing information about Russian government actions targeting U.S. Government entities as well as organizations in the energy, nuclear, commercial facilities, water, aviation, and critical manufacturing sectors. The host for this episode was Dave Stevens. The guest for this episode was […]
Receiving A Message From Alien Species! (The Cyber Underground)
This week on The Cyber Underground, Tom Moore and Dave Stevens ponder questions about possible alien contact in the future. What if we actually got a message from an alien species? From another solar system? From another galaxy? What form would it take? How would we know it was a message? How long did it […]
The Cyber Security Crusade! (The Cyber Underground)
So, you have some cyber security education. Now what? How can you get the necessary experience for that all-important first job? How can you pull ahead of your peers and expand your knowledge in your field? ThinkTech Hawaii streams live on the Internet from 11:00 am to 5:00 pm every weekday afternoon, Hawaii Time, then […]