Here's another short video clip on how your passwords, are your weakest link. It's from my PluralSight Ethical Hacking:System Hacking course
Read More

This course is part of the 20 course Ethical Hacking Series. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking
Read More

When people ask what makes the 2012 LinkedIn data hack and the 2013 Myspace breach different than others, I tell them it shows how little we understand our enemy. This is obviously because the attacker mind set is constantly evolving,
Read More

Let's play a game. Let's see if I can guess one of your passwords, or at least part of it. Is it your dog's name? Does it have your birthday in it? How about your favorite sports team? Did I
Read More

Head over to Pluralsight and check out my blog entry about passwords. http://blog.pluralsight.com/hacking-team-weak-passwords -Dale
Read More

Be careful what you click. You might think you've found a cool-looking new game on Steam, but it could be computer-infesting malware in disguise. Yeah, scammers are imitating entire game pages now. Over the weekend, the makers of psychedelic adventure
Read More

No matter how secure you think a computer is, there’s always a vulnerability somewhere that an attacker can utilize if they’re determined enough. To reduce the chance of sensitive material being stolen, many government and industrial computer systems
Read More