Review: EC-Council’s iLabs Platform

Glenn Norman
This entry is part 18 of 20 in the series [ Certified Ethical Hacker Training ]

I’ve been trying to bring “hacker” training to UNM for over ten years without much success. Only in the past two semesters have I been able to run an Ethical Hacking class based on the CEH, but where my past efforts didn’t bring students, the CEH did. Red Team work has long interested me, likely …

Hacking Tips from the Article, “How To Not Get Hacked, According To Expert Hackers”

Backlit keyboard

TV personality Kevin Roose asked for it, and he got it. He wanted to research how people get hacked, so he decided to invite some prominent hackers to hack him. And hack him they did, cracking into everything from his webcam (pictures every two minutes) to all his online accounts (including banks). Personally, I wouldn’t …

Social Engineering

“Social Engineering can be known as psychological manipulating in shortly, a legitimate lie, but yelling ‘Fire!’ in a crowed movie-theater and in a public is unlawful” “Yes, this is definitely an attack vector, almost relies on human interactions. Often involve tricking people, indirectly prompting people to spill their guts and take advantages on their crush …