SIM Card Identity Theft

Background- What is a SIM card identity theft? Basically, it is the stealing of your mobile identity. This fairly new way of identity theft/fraud is appearing everywhere. The list of attacks to watch out for in the cyber-security world is becoming more prominent and this Continue Reading

Incident Response Plan

Background- Cyber-attacks are becoming a more serious issue by the year. Today, there is no arguing with the facts: attacks are more frequent, sophisticated, widespread, and costly than ever. In 2015, cyber-attacks cost companies about $3 trillion according to “DarkReading”. By 2021, the number is Continue Reading

Protect Your Online Accounts with Two-Factor Authentication

Background- Majority of people today have many different online accounts like: Facebook, Instagram, Twitter, banking accounts, email, etc. Each of these accounts have information about your personal life. The information within these accounts are what hackers look for when figuring out a potential avenue into Continue Reading

Securing a Home Network

Background: Most day-to-day tasks are normally done from the safety of home. Tasks include: checking your banking statements, paying bills, reading emails, chatting on social media, or simply browsing the web. These tasks done on a day-to-day basis, is the reason securing your network is Continue Reading

How to Install Kali Linux as an App in Windows 10

Introduction Recently Kali Linux was released as an application in the Microsoft Store.  Through utilization of the Windows Subsystem for Linux (WSL) compatibility layer, its now possible to install Kali in a Windows environment.  WSL is a feature in Windows 10 that enables users to Continue Reading