fbpx

Blogs & Articles

Cybersecurity News, Latest Vulnerabilities, Hacking Tutorials

So You Want to Be a Hacker: 2023 Edition

So You Want to Be a Hacker: 2023 Edition

Video Version: Introduction The past two years, we've posted blogs on how to become an ethical hacker. Given that these blogs have been well received, we have brought back yet another edition. So, without further ado, let's chat about how you can break into the field...

Linux Isn’t Scary

Linux Isn’t Scary

Learning Linux is essential for aspiring ethical hackers. Start learning the fundamentals today and you will be well on your way to a career in cybersecurity.

Getting Started with Prototype Pollution

Getting Started with Prototype Pollution

Prototype pollution allows an attacker to modify the prototype of an object. This means we can potentially assign new properties or methods to an object. Furthermore, we may be able to overwrite existing properties. If you’re unfamiliar with prototypes and...

What is MFA?  Understanding Multi-Factor Authentication

What is MFA? Understanding Multi-Factor Authentication

MFA stands for Multi-Factor Authentication. Microsoft helps clarify MFA as an additional step in the authentication process, "You need a second thing - what we call a second "factor" - to prove who you are." When logging into your online account, you prove who you are...

How Hackers Target You

How Hackers Target You

When creating a defensive plan against cyber-attacks, knowing your adversary is paramount. Often after the shock has worn off from a breach, the affected company will ask themselves, "Why us?". It's a valid question that organizations should ask before an incident...

Penetration Testing – PCI Compliance – Auditing

See How We Can Secure Your Assets

Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.

 

tel: (877) 771-8911 | email: [email protected]