Concerned About Network Security? Hire a Hacker


Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

If you’re worried about your network security, then you may think the last thing you should do is to invite someone to hack your network. However, one of the types of cyber protection you may not know about involves hiring teams of so-called “ethical hackers” to discover your system’s vulnerabilities.

Beware of Cute Cats

What is it about cat pictures or videos people find so irresistible? The Wall Street Journal reported that an ethical hacking company called PhishMe, co-founded by Aaron Higbee, put together a phishing email that featured a picture of a Turkish Angora cat with a purple mohawk. The email promised that clicking a link would lead the user to more cat pictures. Instead, the link led the employee to a warning from the tech department.

PhishMe designed another fake phishing email designed to prey on employee competitiveness. He sent an email to employees that appeared to come from the company CEO. The email had an attachment that claimed to contain figures for potential bonuses for many company employees. PhishMe then sent a second email attempting to recall the first. Many employees clicked the attachment, which again sent them to a warning page.

Higbee says that cute cats are to employees like kryptonite is to Superman. Of the 3.8 million employees that PhishMe has worked with, 48 percent have clicked on the cute cat phishing email. PhishMe’s work reveals vulnerabilities to “social engineering,” which are attacks designed to capture sensitive information from employees.

Common Vulnerability Points for Networks

In addition to attacks that prey on human frailty, hackers can capitalize on a number of vulnerable network points, including:

  • Wi-Fi networks. When employees do work over wireless, they can expose the company to a hacker. A “man-in-the-middle” attack, for instance, can use a computer with two wireless cards near a Wi-Fi hotspot to lure employees into logging onto a fake network. One wireless card connects to a legitimate network while another generates a fake network. Employees log onto the company intranet through the fake network, giving their credentials to the hacker.

  • USB drives. Imagine an employee using a USB stick to take work from the office to his or her home. The employee’s personal computer downloads a virus, which then transmits itself to the USB drive. When the employee returns to work and inserts the USB drive into a corporate computer, the virus could penetrate the corporate network. The Stuxnet worm, which took down the network at an Iranian nuclear facility, was probably delivered by an operative using a USB drive.

  • Weak passwords. Many employees use obvious passwords like “123456,” “iloveyou,” “password” or their names. Sometimes, they write their passwords on sticky notes and stick them to their monitors or the undersides of their keyboards. Also, many employees use the same passwords for multiple accounts. For instance, if an employee gives away a company email password in a phishing email, and he or she uses that same password for online banking, the employee could face a serious problem.

  • Ethical Hacker Tactics

    Ethical hackers use multiple techniques to reveal network vulnerabilities. An ethical hacker may sit out in a company parking lot and attempt to launch a man-in-the-middle attack on the company’s wireless network. Also, some ethical hackers drop rigged thumb drives in company bathrooms, which employees often pick up and insert into their USB ports. Some ethical hackers go so far as to conduct in-person breaches. For example, a hacker may dress up like a package delivery person or a fire marshal to gain access to restricted company areas.

    Look for an ethical hacker who holds the Certified Ethical Hacker (CEH) credential. A CEH has training in subjects like virus creation, buffer overflows, social engineering, policy creation and intrusion detection. CEH students aren’t allowed into training centers without undergoing a thorough background check. After completing training, a CEH has to pass an examination to earn his or her final credential. CEH’s also sign legal agreements stating that they will not use their training for illegal or malicious purposes.

    If you’re concerned about data loss or network vulnerability, you can find an ethical hacker who can determine your network’s weak spots. These hackers do an important service for consumers, businesses, not-for-profits and government agencies.

Get Paid To Hack


Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

Warning: Division by zero in /var/www/sites/jtnew/wp-content/themes/twentysixteen/functions.php on line 16

One of the things I love most about computers is the ability to learn something new every day. The internet helps me do that from the comfort of my own home and gives me more options than I can shake a stick at for learning new things. You can even take classes online and not just the boring ones, either. This sponsored post is about some of the coolest IT Security classes you can take online. Learn to hack online and then make money doing it.

Security Enforcement

Ethical Hacking
There’s a couple different ways to think about what hacking means. To some people, it’s just seedy characters in seedy places trying to break into your computer and steal your identity. While there’s people out there who do things like that, it’s not the true definition of a hacker. A hacker is someone who thinks outside the box to obtain information and learn new things that is normally unavailable via popular channels. That said, bad hackers are out there, but there is such a thing as Ethical Hacking. Since the EC-Council site does such a good job explaining ethical hacking, I’ll let them tell you in their own words:

The goal of the ethical hacker is to help the organization take preemptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits.

It’s important to note that Ethical Hacking can be learned on your own, but it’s a slow road. Besides, a Certified Ethical Hacker is bound to have better odds making more money. Friends of mine have done this as teams or solo projects and if you’re good, it pays well and is a lot of fun. Now, the pay is better than ever, even in our economy. According to a recent article on CIO.com, the pay for an ethical hacker is up 40%. One of my friends was flown to Japan to hack in to a large company’s network and make a dramatic point about their security needs by walking into a security needs meeting in a highly secured part of the building using only his skills to gain access. “You should have seen their faces”, he told me with a big grin. Speaking for the other side, I manage several servers myself and I can tell you it’s a lot cheaper to pay someone to find all the holes than it is to clean up the mess that an unethical hacker can leave if you don’t.

Roles in IT Security
What if you don’t think hacking is for you? Hacking is rewarding, but there are other IT Security roles that can also be very rewarding and they all pay well. Some of these include pro-active positions like Security Awareness, Security Fundamentals, Advanced Penetration Testing and Application Security as well as some more re-active roles like Disaster Recovery (be the hero), and Computer Forensics (see my post tomorrow for a great real-life example of this from what I dealt with today).

One thing many online classes seem to miss is that a lot of people benefit vastly from the interaction with an actual instructor that a class room environment offers. These guys know that better learning comes from the ability to talk to a real live instructor and get detailed answers to unique and specific questions. They give you access to a real person to help you along as you go.

It’s really a good looking package and I just have to pound the point home… Ethical hacking and IT security is just plain rewarding financially as well as in every other way. If you’re thinking about a career in IT, you should look into this.

Post?slot_id=36467&url=http%3a%2f%2fsocialspark