Search
Close this search box.

Your Online Presence: A Hacker’s Perspective

We’ve all been told by our parents, “Don’t talk to strangers!” But did they ever tell you that you might be telling your friends… too much? For most of us in the digital age, a typical day isn’t complete without logging into social media. And sometimes we get a little too invested in what we […]

A Planet of Power in One Little Box

Continuous monitoring and ongoing vulnerability scanning are both fundamental components of cybersecurity and should be top priority items for any organization. Then again, the term “cybersecurity” makes many executives feel a bit uneasy. What ends up daunting these executives is how expensive it is to have top-of-the-line security. Quality products and services are not in […]

Why You Should Want to Get Hacked

Would you like to be hacked? No, of course not! Well, what if I told you that there is a way to be hacked that can actually benefit your overall network security? When put like that, it doesn’t sound so bad! And that is what Penetration Testing (i.e. Pen Testing) is all about. In simple […]

Malware 101: Criminal Strategies, Pt. 2

In our previous article, Malware 101: Criminal Strategies, Pt. 1, we explained how cybercriminals dupe their targets into downloading malicious software, potentially causing severe damage to the user’s computer. For this article, we will focus on how malware can spread unhindered through a network, without any need for authentication from users. The primary difference between […]

Malware 101: Criminal Strategies, Pt. 1

It’s easy to think, “I won’t be a victim of a cyberattack.” But the truth is that millions and millions of people in the United States alone are victims of cybercrime, and malicious emails are becoming more prominent in this cyber-dependent world. To put that into perspective, in 2017, over 20 million people were victims […]

Malware 101: Trojan Horses

Trojan Horses. Years ago, they were almost all you heard about when people talked about bugs that could damage your computer. But what exactly is a Trojan horse in the world of computers? For spyware and ransomware to work most effectively, the attacker needs to trick the user into downloading his or her malware. The […]

Malware 101: Ransomware

What could be more exciting than pirates? Villainous rogues sailing the high seas, searching for ships in the night to plunder. They come across an unsuspecting ship, ready their cannons – take aim – and in a split second, a barrage of iron and smoke rains from the sky. The shadowy ship positions itself next […]

Malware 101: Spyware

Malware has become mainstream in today’s internet age. Malware comes in many shapes and forms, and almost all of them are used for nefarious purposes. Mission Multiplier wants to make sure that you understand the dangers you face in the cyber world, malware included. That’s why we have decided to give you a few articles […]

A Quick Way to Stop SQL Injections

There are many coding best practices to adhere to. These practices usually have to do with code optimization, but there are coding practices specifically focused on making the application safer. One such example is use of a parameterized query, a query in which placeholders are used for parameters and the parameter values are supplied at […]

DFARS: What Happens After the POA&M

Organizations are finding out that DFARS compliance takes more than a POA&M and SSP. In a 2016 amendment to the Defense Federal Acquisition Regulation Supplement (DFARS), the Department of Defense laid down the law for government contractors who process Controlled Unclassified Information (CUI) from the DoD. According to DFARS Clause 252.204-7012, Safeguarding Covered Defense Information […]