Cybersecurity Blog


Recent Posts

Top 5 Ways IT Managers Can Thwart Hackers

Posted on December 21, 2017 by Craig Nagy

  These five tasks should give you some peace of mind that you are taking major steps to protect your network from hackers. When attacking companies, hackers...

Read More

Can Antivirus Software Be Used Against You?

Posted on October 10, 2017 by Sherri Davidoff, Author of "Network Forensics"

Antivirus software permeates our networks, from mission-critical servers to the CEO’s workstation. Ironically, the very software designed to protect our organizations can be used against us.  ...

Read More

Subnetting != Segmentation

Posted on August 29, 2017 by Dan Featherman

Here at LMG Security, we do a lot of pentesting. I have performed penetration tests on organizations of all sizes, including Fortune 500 companies.   “Black box”...

Read More

Password Cracking with Custom Wordlists

Posted on August 22, 2017 by Craig Nagy

Caption(s): Enigma Machine Source(s): Wikimedia Commons: https://commons.wikimedia.org/wiki/Enigma_machine   Security researchers have been compiling wordlists for years. They have added hundreds of thousands of words and even some...

Read More