How to Install Kali Linux as an App in Windows 10

Introduction Recently Kali Linux was released as an application in the Microsoft Store.  Through utilization of the Windows Subsystem for Linux (WSL) compatibility layer, its now possible to install Kali in a Windows environment.  WSL is a feature in Windows 10 that enables users to Continue Reading

Protecting Against Data Destruction Attacks

Olympic Destroyer Recently, a string of cyber attacks disrupted services and caused a multitude of IT-related issues at the Winter Olympics in PyeongChang.  While who is behind the attacks and the method of compromise are currently unknown the intention of the malware, known as ‘Olympic Continue Reading

Spectre and Meltdown: What You Need to Know and How to Protect Yourself

What are Spectre and Meltdown? Earlier this year security researchers made public the discovery of several vulnerabilities affecting nearly every computer, laptop, and smartphone on the market.  Known as Spectre and Meltdown, the vulnerabilities exist in the design of modern processors and allow for sensitive Continue Reading

Trouble in Paradise: Hawaii Emergency Mismanagement

On Saturday January 13, 2018, people in the Hawaiian islands found themselves in the midst of a large-scale panic when an emergency alert for a ballistic missile attack was broadcasted statewide.  An official all clear message was issued 38 minutes later to both residents and Continue Reading

Defense Strategy for BYOD Networks

    Bring your own device (BYOD) is a trend that has grown increasingly common over the past several years among companies both big and small.   It allows employees to utilize their personal devices in the workplace by connecting them to the internal network, access Continue Reading