Tag: Information Technology

Autistic Individuals Can Solve Cybersecurity Shortage

Autistic individuals have greatly contributed to our society and have earned their places in our history books. One noteworthy individual is Albert Einstein. He developed the theory of relativity and is now known as the father of theoretical physics. Another extraordinary individual with autism is Alan Turing, the man who cracked the Nazi Enigma code. Read More

Reality Winner- NSA Contractor Leaks Classified Information

Reality Winner, 26, is an Air Force veteran who worked as a contractor for the National Security Agency (NSA). While working at NSA, she encountered a classified report with proof that Russians interfered with the 2016 presidential elections by penetrating a voting software supplier in Florida. Furthermore, the document provided proof that the government knew Read More

Cyberstalking

The Internet is an amazing thing that allows us to search for new information and keep in contact with friends and family. However, the Internet also has a dark side. It allows for unwanted people to access private information and it provides direct means in which they can contact you. These are examples of cyberstalking. Read More

Botnets and How to Avoid Them

Botnets are a string of private computers linked together by one server. While some types are legal and serve to run websites, others are malicious. These illegal botnets connect computers through infection by malware, namely Trojan malware. Other less common infections occur through drive-by downloads and spiders. While the owner often doesn’t know that they are Read More

What is Trojan Horse Malware?

Trojan malware was named after the Trojan Horse that ancient Greeks used to infiltrate the city of Troy. The wooden horse was perceived as a gift to the Trojans, but it was a ploy to sneak Greek soldiers behind the Trojan walls and ultimately win the war. Trojan malware works similarly. This malicious type of Read More

Pin It on Pinterest