Last Chance to Save (NO EXCLUSIONS)

December 15, 2017 at 11:06 am | Posted in Careers, Certification Paths, LPI, Microsoft, Oracle, PMI | Leave a comment
Tags: , , , , , , , , , , , , , , , , ,

After a long 2017, it’s now that time of year to think about what you should give up or do differently for 2018. Are you planning on losing or gaining more weight? Exercising more, watching more streaming shows,  or curling up with more good books? Perhaps picking up a new hobby or going back to a project you once abandoned?

We have a better idea. One that could translate into a higher salary or better career. Why not make getting an IT or project management certification as one of your New Year’s Resolutions? From the highly sought-after certifications like CISSP, CEH, and Security+ (just released the new version last month) to the latest Microsoft Azure, Windows, and security certifications, Transcender has got you covered!

mkt-006929-last-chance

And this time, it’s no exclusions – opening up the discount to our up-to-date eLearning (now including Juniper to Amazon Web Services) to get started and cloud-based labs to help you hone your new skills . Hurry now. This deal is too good to last into 2018, so you better act now!

2016: Held Ransom

April 11, 2016 at 4:29 pm | Posted in EC-Council, Technical Tips | Leave a comment
Tags: , , , , , , , , , , , , ,

It was predicted late last year that 2016 would the year for ransomware. Thus far, the prediction is proving right; only four months in to 2016, the Locky ransomware has managed to spread itself over 114 countries (displaying its demands in dazzling array of 24 languages). The Hollywood Presbyterian Medical Center paid $17,000 in bitcoins after having their computer systems seized in February 2016, while hospitals in Kentucky and Maryland report similar attacks.

In case you’ve been in that doomsday bunker a bit too long, ransomware is malicious software that blocks access to your own data, usually by encryption that targets a local computer. Data stays locked away until you pay a tidy sum of money to the hacker (or, more commonly, to the hacking organization). The malware usually contains a ticking bomb that will format the entire hard drive if you don’t pay by a deadline (or post the data for everyone to see, just as extra motivation). The data kidnappers may call themselves hackers or vigilantes, or even pretend to be a federal agency, but their demand is always the same: pay us for your data — or else!

Worse, with automated viruses like Crytpolocker, Crytowall and TeslaCrypt, hackers don’t have to go through the extra effort of targeting big fish like CEOs of Fortune 500 companies. Any end user could be bilked for hundreds of dollars. And, through the economies of scale, hackers rake in millions per campaign. While current year damages won’t be tallied for a while,  the FBI estimates the CrytoWall variant pulled in over $18 million from 2014 to 2015 alone.

gangster-squad-option-2

“Shame if something happened to that hard drive…”

End users are not the only targets; nor are Windows users. Major sites like the New York Times, BBC, AOL and NFL had their advertising networks compromised by malvertising, where a malicious ad hijacked user’s browsers and redirected them to install a crypto-virus via the Angler toolkit (another argument for using adblockers?). And the once near-invincible Mac OS has been revealed as the target of the KeRangers malware – the first ransomware Mac users have ever had to contend with.

In this climate, is it any surprise then that a prominent security certification vendor like EC-Council was a recent target? Read more for the details.

Continue Reading 2016: Held Ransom…


Entries and comments feeds.

%d bloggers like this: