Cyber Incident Search Results

News: Why YOU Should Study Digital Forensics

As many of you know, I have been running a couple of series here on Null Byte about digital forensics called Digital Forensics for the Aspiring Hacker and Digital Forensics Using Kali. Although many readers have seemed to enjoy these series, just as many seem to be pondering, "Why should I study digital forensics?"

How To: Use a Polaris incident light meter

In this Fine Art video tutorial you will learn how to use a Polaris incident light meter. The meter has a power, mode, ISO control and a multi flash exposure buttons. On the side you have the up / down and the trigger buttons. Power on the light meter. Select the mode, say ambient light and then set the ISO by pressing the ISO button and the up/down button. Now using only the up/down button, set the shutter speed. Then place the meter under your chin to meter the light on your face. Press the...

How To: Deal with cyber bullies and internet harassment

Don’t let cyber bullies push you around, being nasty and spreading rumors about you online. Learn how to fight back against tormenters who hide behind a computer screen. Internet harassment is just as damaging and hurtful as any other form, and proper action needs to be taken to keep the victim safe. Watch this video tutorial and learn how to protect yourself or someone else from cyber bullies,internet harassment, or online rumors.

How To: Use the history and audit trails in Axosoft OnTime

This installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite focuses on how you can see the history of your defects, features, tasks, and incidents, as well as project wiki pages. For more information, as well as to get started using the history and audit trails features in Axosoft OnTime 2008, take a look.

How To: Use the User Dashboard in Axosoft OnTime 2008

The User Dashboard in OnTime is a great way to look at items across types and edit them. See how to view and search through data regardless of its type (Defect, Feature, Task, Incident) by taking advantage of the User Dashboard. For detailed instructions on using the dashboard, watch this installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite.

How To: Use worklogs in Axosoft OnTime

Worklogs are the time sheets of OnTime. They help track the time your developers spend working on bugs and features, or the time that tech support staff work on incidents. There are several ways to interact with worklogs and this installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite covers them in detail.

News: Jobs & Salaries in Cyber Security Are Exploding!

In an article published in early-2015 by Peninsula Press, it was reported that the demand and the salaries for cyber security professionals are exploding! They cite that 209,000 cyber security jobs were unfilled last year, and that job postings have increased over 74% in the last 5 years. Job opening are expected to grow by another 53% over the next 3 years. You are definitely in the right field, my tenderfoot hackers! Some researchers are expecting information security jobs to continue to gr...

How To: Translate online dating profiles

Dying to try online dating, but worried that the guy that you're digitally winking at is really a cyber stalker? Then watch this Dating Advice how-to video to learn how to date and decode online dating profiles. With this online dating translator you are sure to keep all the cyber stalkers out of the running.

News: Predictions for the New Year

infosecinstitute posted a handy article about what to expect in the new year for cyber security, along with highlighting major game changers from 2015; 2016 Cyber Security Predictions: From Extortion to Nation-state Attacks - InfoSec Resources.

How To: SSH into your iPhone/iPod Touch

This video describes about accessing an iPhone in Ubuntu using open SSH, cyber-duck, Netatalk. For accessing using SSH, make sure your iPhone's Wi-Fi connectivity is on. Now open your terminal and type "SSH root@'address'". Here address refers to the IP address of your iPhone. You have to type a password to access the iPhone contents. Once you are authenticated type "ls" and you will be shown with the contents of the iPhone. The second method is using cyber-duck. In it, choose SFTP as the con...

How To: Create an artsy Frida Kahlo hairstyle for Halloween

Like all famous artists, Frida Kahlo had a very colorful life. Raised in a small town outside Mexico City, she lived through the Mexican Revolution and was struck by a bus as a teenager, an incident which caused a broken spinal column, broken collarbone, broken pelvis, fractures, and a punctured uterus which led to infertility problems later on.

Cyberwar: Hacker vs. Hacker

From time immemorial, human beings seem to be at odds with one another. When these differences become so heated and unresolvable, it eventually erodes into physical violence. This violence has manifested into some of the most horrific exercises in human history, things which every school child is aware of and none of which we have to recount here. Although humans have been cruel and violent for a very long time, the 20th century may have epitomized that behavior. With two World Wars and many,...

How To: Apologize to a woman

In this Love Birds tutorial, the counselor, Roger Gil tells how to apologize to a woman. He says that we can apologize to women to reestablish some level of connection that has been damaged due to some incidents. He says that guys should not feel that apologizing is like surrendering. He says this can be an obstacle in the relationship. He says that the first step is to acknowledge the wrong action that we may have done. He says its not worth it to hurt a woman's feelings, and we should immed...

News: The Hack of the Century!

Although this century is still young, with little fanfare we may have just witnessed the "Hack of the Century." AV software developer Kaspersky of Russia recently announced that they found that some hackers have stolen over $1 billion from banks around the world!

News: A US Release of Grab's 'Panic Button' Feature Could Mean Safer Rides

Ride-hailing services are everywhere nowadays and with new companies developing all the time, it is one of the most convenient ways for people to get around. Companies like Uber make it easy for passengers to call a car to pick them up and drive them to their desired location. These services have been especially helpful for commuters as well as those who might need a ride home after a night at the bar. However, ride-hailing services require driving with a total stranger, which means the safet...

News: Airline Offers Frequent Flyer Miles to Hackers

One more business has decided that rewarding hackers to find flaws in their computer systems is a wise investment! As you know, a number of software companies offer bug bounties, and some of these can be quite lucrative. Google, for instance, offers a bounty of $150,000 for anyone who can hack their Chrome operating system, and many other companies are offering similar bounties, although, not quite as lucrative. Now, United Airlines has decided to offer frequent flyer miles to hackers who fin...

Prev Page