What is phishing?

Phishing is the act of someone masquerading as someone else online in an attempt to do damage to a service or gain access to information. There are many variations of phishing, from general email phishing: targeting large amounts of people, to spear phishing: only targeting one person, phishing websites that lead you to malicious links and files, and even smishing, where the same email phishing process is repeated over text. All of these instances share the same procedure, a hacker masquerading as a trusted service, company, or person, in an attempt to either have the victim give…


Some of the coolest things in Cybersecurity happen within the Red and Blue teams. Although they sound like a fifth grader’s PE dodgeball team names, they are the most literal and legal, forms of movie “hacking”. Red team is known for being “sexy”, yes, a term that is actually used, way too often I might add, to describe the position. They are the hackers, professionals hired by companies to penetrate their security systems. Red team’s opponents are the Blue team, a team of defensive professionals tasked with ensuring the security of the company. Both teams work together to create a…


One of the first areas we cover in our Cyberdefense courses is Local Security Policies or LSP. We begin here because LSP isn’t a super hard concept to grasp and it plays a vital part in the security of every system. Local Security Policies are anything that have to do with the security of a local computer. They aren’t that difficult to configure and if done right, are extremely effective. These policies provide an important line of defense against many security vulnerabilities. However, policies as simple as a strong password policy seem so obvious that they are often overlooked and…


Let me just start out by saying that I do not vibe with the term Hackathon. Although the name may imply otherwise, there is actually a major lack of hacking occurring. A Hackathon is an event where a bunch of people divide into teams to develop prototypes and projects in a short period of time. Hackathon producers use the traditional denotation of the word hacking, meaning “putting stuff together”, however as a person in Cybersecurity and living in modern society, I think of the current 2020 denotation of hacking, relating to compromised systems, unauthorized access and black hat work. Even…


One of the most important and straightforward areas of Cybersecurity, is that of processes and services. In this post, I will discuss what processes and services are, as well as the importance of knowing which are running on your system and how to properly maintain them.

Put simply, all services are processes. A process is a program that runs on your computer and a service is a type of process, managed by the computer, and typically runs to start programs. One of the main differences between processes and services is the termination of them. …


A few months ago, I found myself thrown into the world of Cybersecurity. It happened completely accidentally, I wrote my email down on about 100 different clipboards at a college club fair, and somehow in that pile of emails, I found CU Cyber.

The best thing about CU Cyber is that it isn’t just some group that meets so rarely that you forget that you’re even a part of it. They have weekly meetings where they bring in esteemed Cybersecurity professionals, weekend social events like frisbee and movies, and what really sold me: two classes taught by the club that…

Madeleine Wolfe

As a newcomer to the world of Cybersecurity, these posts are a collection of stories and information that I have learned along the way.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store