Author - lbena3

laptop computer and woman using smartphone

NSA Cautions for Mobile Device Threats

With over 90 percent of the global internet population using mobile devices, the National Security Agency (NSA) is appropriately focused on providing best practices for mobile users to ensure their security and safety. Cybersecurity threats to users continue to increase in frequency and complexity, stressing the importance of heeding the NSA’s threat-mitigation suggestions.  The NSA Mobile Device Best Practices guide provides strict guidance on a couple rather common practices. For instance, mobile users should not open links...

man with glasses looking at a computer screen with blue overlay

Mobile Operations Disclosed: A Case Study

Mobile devices have simplified how users access web-based services. Smartphone owners have a constant connection to the internet in their pockets, and this connection is available to hundreds of millions of people that don’t have access to standard computers or home internet services. More apps, such as Instagram and TikTok, are being created on mobile first before being...

Ntrepid headquarters, managed attribution solutions for government

Dark Web Access for Investigations

  How Can I Access the Dark Web? The dark web can be accessed through the onion router, or Tor, which is a network that routes your internet traffic through a series of proxy servers, adding a layer of encryption each time. You may be wondering how to access this network. Fortunately,...

The Challenges of Using Commercial-Off-the-Shelf (COTS) Technology for OSINT Analysis Within the U.S. National Security Community

The OSINT Race  Criminal actors are aware of the vast amount of data available to understand and undermine United States policy, democratic processes, and the economy. Therefore, the internet becomes a powerful weapon for both sides of the cyber war. In order to operationalize OSINT, the U.S. Department of Defense must have access to the most innovative technologies. They must also master the information domain in order to plan for and counter the...

Commercial-cyber-security

Cyber Security: Technology Alone Will Not Win the Cyber War

Setting Priorities in Cyber Security  Folks are running out to pay $4.00/gallon for Super Unleaded gas because that’s all that’s left, if any, after the Colonial Pipeline ransomware attack has initiated a toilet-paper-like hoarding event. We’ve been blogging for years about the increasingly sophisticated tools and techniques the bad guys are using that could...

An image of a magnifying class and data, representing end of data tracking by third-party cookies.

The Future of Ad Tracking

Google, Apple, and Firefox are each shutting down support for third-party cookies—also known as “tracking cookies”—citing an increased need for privacy online. Additionally, the U.S. government’s movements towards increased data privacy will lead to further regulations against formerly commonplace data-tracking methods.

blue banner person using laptop keyboard

Virtual Interview Tips at Ntrepid

Secure Your Dream Job from Home While COVID-19 has caused many sudden changes, we’re still hiring! Ntrepid is looking for dedicated career seekers to join our company. As we move our interviews to a virtual setting, we’re here to help you maintain your confidence and succeed in communicating your expertise. Follow our tips as you prepare for and engage in virtual interviews.  1. Do your research   Just...

Breaking Down the OSINT Cycle

Transforming open source data into intelligence, or OSINT, has become increasingly complex over the last decade. Although more open sources are available to operators, the dramatic increase of false information and adversarial counter attacks online have made the collection of data an even more tedious process. Known as the OSINT...