
Facebook's Related Links: A Security Feature?
You won't expect someone who gives cybersecurity awareness talks regularly to fall into simple clickbait scams do you? Well … I did. I...
You won't expect someone who gives cybersecurity awareness talks regularly to fall into simple clickbait scams do you? Well … I did. I...
Hello Facebook! My name is Kevin M. James. I am the manager of the BMW Marketing Group and I own 12 BMW’s. This is one of them, a brand...
I am a cryptocurrency enthusiast who has been into cryptocurrency for more than a year. I’m largely involved in Bitcoin and Litecoin...
Introduction to Dionaea Dionaea “the Nepenthes successor” is a malware capturing honeypot initially developed under The Honeynet...
Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...
A covert channel is used to transfer information between processes that aren't allowed to communicate as defined by the computer security...
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...
Remote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an...
The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as...
Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...
One thing I really missed out this year is RSA Conference APAC 2013's closing by the all-famous Frank Abagnale. On the bright side, I...
Javvad Malik – named the “Most Entertaining Blogger” & “Best Video Blogger” at the European Blogger Awards 2013 – presented “How...
Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...
With Black Hat and DEFCON just a few hours away, here are some tips for those who are heading to Las Vegas, to stay secure and not fail...
These are the data/information you provide to Facebook: Name City of birth City of residence Phone Email Current employment Previous...
Quick Tips Network name hiding and MAC address filtering are for safety, not for security. Never use WEP as your wireless encryption...
In this video, Mark Russinovich demonstrates how you can find and remove malware (e.g. Stuxnet and Flame) using Sysinternals tools. Some...
Reading packets can be invaluable to security professionals. Especially when trying to understand how NIDS/NIPS or other packet filtering...
A couple of months back, I walked past a friend who was working furiously on her laptop. It was her red BackTrack wallpaper that caught...
For anyone who's experienced with Metasploit will know that there's a risk of crashing the target system. That's because systems...