Skip to main content

Articles

  • Hacktivism: Anonymous

    Hope Trampski - Dec. 19, 2024

    Origin  The hacktivist group Anonymous was founded in 2003 on an imageboard, 4chan, which was a forum where users could anonymously post images and discussions. The name Anonymous originated from… Read More

  • Hacktivism: DarkSide Hacking Group

    Hope Trampski - Dec. 12, 2024

     DarkSide is a hacking group believed to be based out of Russia. They provide ransomware as a service accompanying their frequent high-profile attacks. First spotted in 2020, the group is fairly … Read More

  • Hacktivism: The Short Life of LulzSec

    Hope Trampski - Dec. 05, 2024

    Origins  LulzSec came onto the scene in 2011 after their first recorded hack against Fox.com's website. ‘Lulz’ stands for laughs while ‘sec’ is shorthand for security essentially meaning every ti… Read More

  • Hacktivism: WikiLeaks

    Hope Trampski - Nov. 28, 2024

    WikiLeaks is a nonprofit media organization founded in 2006 by Julian Assange, Kristinn Hrdnsson, and Danial Mathews. The site is used to publish leaked documents from governments, corporations, … Read More

  • Hacktivism: The Chaos Computer Club

    Hope Trampski - Nov. 21, 2024

    Hacktivism: The Chaos Computer Club   The Chaos Computer Club, founded in 1981, is Europe’s largest association of hackers. As an organization they stand for ‘freedom of information’ and aim to p… Read More

  • Hacktivism: The Cult of the Dead Cow

    Hope Trampski - Nov. 14, 2024

    What is the Cult of the Dead Cow?  The Cult of the Dead Cow, founded in 1984, started as a group of like-minded hackers looking to improve their skills. As the group developed, they pivoted towar… Read More

  • What is Hacktivism?

    Hope Trampski - Nov. 07, 2024

    The term hacktivism has been a bit of a buzz word for the past couple of decades, falling in and out of popularity in accordance with the number of politically motivated hacks that grab media att… Read More

  • The Ashley Madison Hack

    Hope Trampski - Nov. 01, 2024

    Hacking almost always results in the release of personal information. Whether that be credit card numbers, social security numbers, or other sensitive data, leaks happen all the time. In the case… Read More

  • AI As A Tool

    Hope Trampski - Oct. 28, 2024

    What AI Looks Like Day to Day  AI is an ever-evolving field, it seems that every day there is something new in the works. The topic of AI can get pretty complicated pretty quickly. So, realistica… Read More

  • The Dennis Kucinich CBS News Hack

    Hope Trampski - Oct. 25, 2024

    Hacking, in most cases, is a very selfish act. Most hackers are in it for the money or the information they can turn into money. But in some cases, hackers commit cybercrime because they believe … Read More

  • How Not to Take the Bait When it Comes to Phishing

    Hope Trampski - Oct. 21, 2024

    Phishing is one of the most common forms of cybercrime, with around 3.4 billion phishing emails sent each day it is nearly impossible to avoid. The good news is that falling victim to these scams… Read More

  • The Triton Malware Attack

    Hope Trampski - Oct. 18, 2024

    Completely unsolved cybercrime cases are relatively rare. Normally when an attack ensues, one of the most important proceedings is to trace it back to the attacker. This is especially important w… Read More

  • Why Are Software Updates So Important?

    Hope Trampski - Oct. 14, 2024

    The importance of keeping your software up to date cannot be stressed enough. Often, we find ourselves putting off these updates because it can be inconvenient to be without our devices for the p… Read More

  • The Mystery of the WANK Worm

    Hope Trampski - Oct. 11, 2024

    In 1989, Galileo, a nuclear-powered spacecraft created by NASA, was set to launch. Its existence was controversial having been announced in the wake of the Challenger Disaster, but that wasn’t th… Read More

  • Multi-Factor Authentication

    Hope Trampski - Oct. 07, 2024

    To expand on our discussion about secure passwords from last week, let’s look at multi-factor authentication. Multifactor has only been around for about twenty years, but that's a good chunk of t… Read More

  • Broadcasting Masks and Mayhem

    Hope Trampski - Oct. 04, 2024

    Welcome to spooky season, we are so glad you could join us for our October series on unsolved cybercrimes! While it might be comforting to think we know the origin of every instance of malicious … Read More

  • Password Security and Password Managers

    Hope Trampski - Oct. 02, 2024

    Ensuring proper password safety is a never-ending task, mostly because the rules seem to keep changing. The rules used to seem easy; create a password you’ll remember. Oh wait, that’s too easy, t… Read More

  • Where are we now?

    Hope Trampski - Sep. 17, 2024

    Even after decades of development in our field, one thing stays consistent, change. There are always new threats, new vulnerabilities, new fixes. The only thing that stays the same is that things… Read More

  • WannaCry?

    Hope Trampski - Sep. 10, 2024

    The WannaCry ransomware attack, taking place in our not-too-distant past, 2017, is one of the most devastating ransomware attacks to date. Spreading to over 200,000 computers, the ransomware wrea… Read More

  • How much do you know about Stuxnet?

    Hope Trampski - Sep. 03, 2024

    The Stuxnet Worm was discovered in June of 2010 by Sergey Ulasen, an employee of VirusBlokAda, a small antivirus company. At first it was mistaken as an arbitrary Windows bug, just a conflict bet… Read More

  • Eagle Eye: AI and Its Ethical Concerns

    Hope Trampski - Aug. 30, 2024

    Eagle Eye  Eagle Eye, released in 2008, is an action-packed techno-thriller that left audiences clutching their popcorn with anticipation- not because the film was mysterious or nuanced, but beca… Read More

  • Hackers of the 2000s

    Hope Trampski - Aug. 27, 2024

    If you thought the ‘90s were packed with cybercrime, the next decade brought an even greater wave of cyber threats. The rapid evolution of the internet introduced a multitude of unprecedented cha… Read More

  • Enemy of Realistic Surveillance Depictions

    Hope Trampski - Aug. 23, 2024

    Enemy of the State, a widely popular political action thriller starring Will Smith is much more than just a gripping nail-biter, it was a look into the realities of modern-day surveillance techni… Read More

  • The ILOVEYOU Worm, A Global Crisis

    Hope Trampski - Aug. 20, 2024

    The ILOVEYOU worm is known as one of the farthest reaching occurrences of malware to date, having affected around 45 million users in only 10 days. The worm caused around $10 billion in damages, … Read More

  • Cyber Unrealism: The Net

    Hope Trampski - Aug. 16, 2024

    The Net 1995 The 1995 film, The Net, starring Sandra Bullock was one of Hollywood's first attempts at an action-packed cyber thriller. It follows the main character Angela Bennett as she goes on … Read More

  • Hackers of the '90s

    Hope Trampski - Aug. 13, 2024

    In 1990, the turn of the decade saw a massive uptick in the number of computer hackers as the internet evolved into the tool we know it as today. While the World Wide Web didn’t become available … Read More

  • The Beekeeper, Keeping it Unrealistic

    Hope Trampski - Aug. 09, 2024

    The Beekeeper, released in January of this year, is an action suspense thriller that stars Jason Statham with a premise around cyber scams. We follow him through a campaign of vengeance as he tri… Read More

  • Porches and Pacific Bell Dumpsters

    Hope Trampski - Aug. 06, 2024

    In 1990 in Los Angeles, California, Michael B. Peters won a Porsche from the Los Angeles radio station KIIS-FM. Well...not really.   Kevin Poulsen is a well-known hacker who took over all the tel… Read More

  • Hackers, a '90s Cautionary Tale

    Hope Trampski - Aug. 02, 2024

    Hackers, released in 1995, showcased ridiculous visuals and at times an equally ridiculous portrayal of hackers. It is chalked full of ‘90s cyberpunk flair. If this movie could be summed up in on… Read More

  • Viruses of the 80s

    Hope Trampski - Jul. 30, 2024

    As we discussed in a recent blog post, Creeper is known as the first computer virus. However, the first malicious virus was actually created by a 15-year-old high school student named Rich Skrent… Read More

  • The Matrix, Far From Reality?

    Hope Trampski - Jul. 26, 2024

    The 1999 film The Matrix was a revisionary movie in plot, special effects, and references to modern technology. It fascinated audiences with action, drama, and high stakes all while keeping to a … Read More

  • Do you know what the Morris worm is?

    Hope Trampski - Jul. 23, 2024

    In 1988 there was only a meager 60,000 computers connected to the internet. But this low number of the late 80s may have been for the best. On November 2nd, 1988, the Morris worm began to wreak h… Read More

  • War Games and Grim Warnings

    Hope Trampski - Jul. 19, 2024

    The film War Games, released in 1983, captivated audiences with a thrilling depiction of military super computers and the possibility of nuclear war. Hidden within the story of a young boy with a… Read More

  • Kevin Mitnick, sound familiar?

    Hope Trampski - Jul. 16, 2024

    Kevin Mitnick is known as one of the world’s first cybercriminals, but before his infamous hacking career, he got his start in social engineering at only twelve years old. Living in Los Angeles, … Read More

  • Sneakers, a 90s Cyber Success

    Hope Trampski - Jul. 12, 2024

    Here at cyberTAP we value real world applications, and as cyber professionals, we understand the practical nuances of our industry and how it applies to everyday life. However, the same can’t alw… Read More

  • How much do you know about the history of cybersecurity?

    Hope Trampski - Jul. 09, 2024

    Welcome to our deep dive into the history of cybersecurity! Join us as we uncover the development of our field through the decades by looking into some of the most notorious hacks and cybercrimin… Read More

  • OK, I know what Zero Trust means. Now what?

    Matthew Crain - Apr. 13, 2022

    In the previous article, I spent some time unpacking NIST’s seven tenets of zero trust. However, those ideas only describe what zero trust intends to accomplish, and that leaves many questions un… Read More

  • Let's talk about NIST

    Chandler Ball - Apr. 06, 2022

    Since the creation of the TCP/IP protocol in 1983, that created the building blocks of the internet we know and love today, the technological world that we live in is rapidly evolving. Every inno… Read More

  • Amazon Patents Smell and Skin Texture as Biometrics

    Chuck Garwood - Mar. 29, 2022

    Amazon was recently awarded several patents for using biometrics such as smell and skin texture to identify people. Amazon’s Ring cameras have been a bit of an outlier lately as they don’t offer … Read More

  • Log4j Rehashed

    George Bailey - Mar. 22, 2022

    It was December 10, 2021, when the cybersecurity community was ablaze with hunting down yet another critical vulnerability. I know it's hard to keep vulnerabilities straight when they are discove… Read More

  • Purdue Cybersecurity Apprenticeship Program is Ready to Enroll

    James Stratton - Mar. 09, 2022

    Does your company need to upskill your cyber-team? Are you an individual working in a cyber role and want to become a cyber-apprentice? Are you a US citizen? Then get in here and let’s have a cha… Read More

  • Identity Broker: How Does it Fit in the Identity Management Puzzle

    Mike Johnson - Feb. 25, 2022

    Recently for a project, the need arose to seamlessly, or as seamless as possible, connect two disparate Learning Management Systems so that users from one system can access content from another w… Read More

  • What it SIEMs vs. What it is: Exploring the Commonalities and Differences between SIEM, MSSP, and MDR.

    Jeremy Johns - Feb. 15, 2022

    Adopting a new technology in the workplace can lead to major changes in policies and/or procedures. Adopting a new security technology is no different; no matter your choice, there will be benefi… Read More

  • Intro to Zero Trust

    Matthew Crain - Jan. 27, 2022

    This is the first in a planned series of articles about the concept of zero trust. It is a big subject; today, we will start small, and focus on getting the most basic understanding of just what … Read More

  • Salesforce Says, "Yes," To MFA

    Staff Author - Jan. 11, 2022

    "You know how we tell the good guys from the bad guys? The bad guys shoot at us." Rick Yancey learned this from his father, a concept that can be applied to the cyber world. The "bad guys" are fi… Read More

  • Tor, What Is It Good For

    Krassimir Tzvetanov - Jan. 05, 2022

    In early December, Radio Free Europe reported that Russia blocked the Tor service. Is that an effort to fight online crime and illegal content, or is there something deeper? Spoiler alert - I won… Read More

  • Cyber Predictions For 2022: What's Coming Next Year

    Eric Engle - Dec. 14, 2021

    It's December, so you know what that means; it's prediction season! It's the particular time of year when everyone gives their opinion on what will happen next year in cyber. We, of course, are n… Read More

  • What's Your Stripper Name? Social Engineering Through Viral Media

    Jeremy Johns - Dec. 07, 2021

    Around the time Eminem started asking if he could have our attention, another trend was taking off across the world in the form of Social Media. The rise of social media brought with it a new tec… Read More

  • Everyday Habits That'll Increase Your Cybersecurity

    Staff Author - Nov. 30, 2021

    Before coming to cybersecurity, many professionals have different ideas and practices than are required to preserve the security of information. These practices often include: clicking on links i… Read More

  • New cybersecurity law providing support for K12

    Joe Beckman - Nov. 23, 2021

    Distinguished as one of the few pieces of legislation to be signed by the President of the United States in the past decade, Public Law 117-47, known as the K-12 Cybersecurity Act, requires the f… Read More

  • CMMC v2.0 Launched...Well, Sort Of

    George Bailey - Nov. 16, 2021

    As many readers of the cyberTAP blog already know, suppliers of goods and services to the United States Department of Defense (DoD) have been put on notice to improve their cybersecurity postures… Read More

  • The Passwordless Future

    Micah Snabl - Nov. 09, 2021

    For a long time in the world of computers, "security" has nigh been synonymous with "passwords". "Make complex passwords." "Don't share your passwords." "A member of our staff will never ask you … Read More

  • Ransomware in Critical Infrastructure, and What You Should Already Be Doing

    Matthew Crain - Nov. 02, 2021

    Ransomware attacks show no sign of slowing down anytime soon. In late September, one after another, two large ransomware attacks targeting the agriculture industry came to light. The ransomware g… Read More

  • Where is the privacy with wearable technology?

    Scott Richards - Nov. 02, 2021

    So, when I decided to write about privacy with modern technology, I found an interesting thing occurred. I was convinced that the privacy concerns would break down over age groups. I started rese… Read More

  • Purdue@WestGate hosting Cybersecurity Demo Day in partnership with Purdue cyberTAP and Purdue MEP

    Staff Author - Oct. 25, 2021

    Tuesday, October 26th, Purdue@WestGate is hosting an all-day, in-person networking event for students, small-business owners, or anyone interested in pursuing a cybersecurity career to network an… Read More

  • Open Source in Application Development: Safe or Total Thermal Nuclear War?

    Mike Johnson - Oct. 19, 2021

    Are open-source software tools safe to use in application development? Probably...Sometimes...It Depends. Truthfully, it is challenging for a general consumer to know if a developer has knowingly… Read More

  • Cybersecurity Awareness Month: Secure Your Phishing Defenses

    Staff Author - Oct. 12, 2021

    From ransomware to SolarWinds, the cybersecurity space has been as hectic as it has ever been over the last 12-24 months. However, for all of the emerging threats and news that are cropping up on… Read More

  • Cybersecurity Awareness Month: Get Familiar with the Cyber Basics

    Staff Author - Oct. 05, 2021

    At a time when we are more connected than ever, being “cyber smart” is of the utmost importance. This year has already seen more than a fair share of attacks and breaches, including the SolarWind… Read More

  • Year in Review - Message from the Director

    Mat Trampski - Sep. 28, 2021

    Hello again everyone! Thanks for giving cyberTAP your attention; we very much appreciate our partners, clients, and friends. Without you we’d be really bored, not to mention, without you we could… Read More

  • Knock! Knock! Your Package Has Arrived: Amazon's New In-Garage Delivery Service

    Chuck Garwood - Sep. 21, 2021

    Amazon recently announced a new delivery service, where they will deliver packages directly into your garage. No more worrying about porch pirates stealing your Amazon Prime Glitter Bombs off you… Read More

  • In Ransomware, the Kids Aren’t All right. The Taxpayers aren’t Either.

    Joe Beckman - Sep. 04, 2021

    According to their website, the Judson Independent School District in Texas discovered on June 17, 2021, that it was victimized by ransomware.  The attack made unavailable the district’s critical… Read More

  • Not just a matter of Gbps - Classifying DDoS Attacks

    Krassimir Tzvetanov - Aug. 10, 2021

    Distributed Denial of Service (DDoS) attacks are becoming prevalent in our daily life. Just in the past ten years, things have changed significantly – from the forgotten hacktivist collective Ano… Read More

  • I Am Not a Cyber Expert - Odds Are, You Aren’t Either.

    Jeremy Johns - Aug. 03, 2021

    Three years ago, I thought I had everything figured out. Finish up school, land a job doing something in the field I studied in, raise a family, etc. Little did I know my path was going to change… Read More

  • Cybersecurity Insurance - Another tool in your risk management strategy

    George Bailey - Jul. 27, 2021

    At the core of all cybersecurity policies, procedures, standards, guidelines, frameworks, technical controls, training, etc., is the idea of risk management.  Managing the risk of a data breach t… Read More

  • Don't Threaten Me with a Good Time -- DPAs in Modern Business

    Carly Turow - Jul. 07, 2021

    We were a little surprised recently when we received a DPA that included requirements to comply with regulations in Dubai and New Zealand. Dubai? Why a city and not a country? Heck, why not just … Read More

  • Ransomware is a Scourge, But Also Helpful

    Matthew Crain - Jun. 29, 2021

    Everything, everywhere, eventually comes down to money. Even non-profit health care organizations tend to operate as if they have investors peering over their shoulders, because each dollar repre… Read More

  • Training the Next Cybersecurity Professionals

    Staff Author - Jun. 23, 2021

    Over the past 18 months, the world has transformed, and many professionals relocated to working in a remote setting. Unfortunately, the speed at which this transition took place, coupled with the… Read More

  • The Colonial Pipeline Attack: A New Phase in Cyber Defense

    Joe Beckman - Jun. 15, 2021

    Since the initial accusations of election interference in 2016, the steady stream of hacking incidents attributed to the Russian government has plagued US cybersecurity practitioners like chronic… Read More

  • Stopping DDoS in its Tracks

    Krassimir Tzvetanov - Jun. 08, 2021

    I often get asked, "What’s the best equipment one can buy to protect my company from a Distributed Denial of Service (DDoS) attack?" While this is a valid question it is making a very large numbe… Read More

  • Message from the Director - June Update

    Mat Trampski - Jun. 01, 2021

    The very excellent Eric, with whom rests the primary responsibility of our blog and newsletter, has been badgering me for some time to provide a note from the director. He’s been patient and I’ve… Read More

  • The Critical Security Controls for Small to Medium Size Business.

    Nate Bradbury - May. 18, 2021

    The Center for Internet Security (CIS) is a non-profit organization dedicated to developing guidelines and standards to help organizations and individuals alike protect themselves from internet t… Read More

  • Don't Trust Users: Application Security Basics

    Micah Snabl - May. 11, 2021

    When it comes to application security, it pays to be a cynic. When developing a tool, it is quite easy to focus on all of the things it is supposed to accomplish. The converse is of similar impor… Read More

  • Phishing: Beware of those Sneaky, Slimy, Stinky Messages

    George Bailey - May. 04, 2021

    It’s 3 am, you are abruptly awoken from a deep sleep by a banging on your door.  You wipe the sleep from your eyes and glare at your alarm clock, who could that be at this hour, you say to yourse… Read More

  • Securing Mr. Roboto: Cybersecurity in ICS Environments

    Joe Beckman - Apr. 27, 2021

    The February 5, 2021 attack on the Oldsmar, Florida water supply brought the cybersecurity of industrial control systems (ICS) to the front of national attention in the United States. As is often… Read More

  • A Letter to Cybersecurity from an Application Developer

    Mike Johnson - Apr. 20, 2021

    Dear Cybersecurity, I don't get you. I thought we were going to be good friends instead, you hang out with all my other friends. You've changed, I don't recognize you anymore. I know we haven't a… Read More

  • What is Cyber Threat Intelligence?

    Krassimir Tzvetanov - Apr. 13, 2021

    Over the past 8-10 years, the term Cyber Threat Intelligence (CTI) permanently settled in our dictionary. But what is it? Apart from every term containing "cyber" is cool, it does not appear we h… Read More

  • What it Takes to Admin SaaS

    Staff Author - Apr. 06, 2021

    What does it take to administer a SaaS (Software as a Service) application? Well, here are some thoughts. First, you need to know what the software can do. I don't mean the stuff they put on the … Read More

  • What is CMMC?

    George Bailey - Mar. 30, 2021

    Wait, What, another cybersecurity standard to implement?!? Yes, amongst all the available choices from NIST, FIPS, ISO, COBIT, ISACA, PCI, and many others, a new standard has been developed. This… Read More

  • Defense Lives Here: What a former B1G Ten Defensive Player of the Year can teach us about defensive cybersecurity?

    Mat Trampski - Mar. 16, 2021

    In 2015 Purdue University’s perimeter was secure. The necessary controls in place demonstrated to our most sophisticated adversaries that nothing would be “easy” from the outside. To match this s… Read More

  • Moving a Workforce Out Of Office

    Mike Johnson - Mar. 09, 2021

    Raise your hand if the current pandemic climate has accelerated a change or outright shift in the way you do business. Keep your hand raised if you weren’t 100% prepared for this shift. For those… Read More

  • Why Do I Need a Cybersecurity Risk Assessment?

    Matthew Crain - Mar. 02, 2021

    Every cybersecurity program I’ve ever seen lists risk assessment as its first step, a foundation upon which all the other security measures will build. But with so many potential fires to fight, … Read More

  • Understanding the SolarWinds “Sunburst” Hack

    Joe Beckman - Feb. 23, 2021

    You could be forgiven if you rolled your eyes and clicked through to the next story when you first learned of the SolarWinds hack. Cybersecurity incidents have become commonplace events and if yo… Read More

  • Knowledge is Power

    Staff Author - Feb. 16, 2021

    Picture if you will a special operative who has been given the directive of establishing communication between generals on the field of battle. These generals are from different countries and spe… Read More

  • Welcome to the cyberTAP

    Mat Trampski - Feb. 09, 2021

    I’m a lucky guy, what else can I say! Good health, good family, and a good job… The world faces the shifting sands of an ever-changing cybersecurity landscape: new strains of ransomware popping u… Read More

Sign up for the newsletter

Return to main content

Purdue University, 610 Purdue Mall, West Lafayette, IN 47907, (765) 494-4600

© 2021 Purdue University | An equal access/equal opportunity university | Copyright Complaints | Maintained by Technical Assistance Program

Trouble with this page? Disability-related accessibility issue? Please contact Technical Assistance Program at tap@purdue.edu.