top of page

Area41 Security Conference Report

This is to report and reflect the experiences and content of the recent Area41 security conference in Zürich on 2-3 June. The conference...

Thug – A Client Honeypot

Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...

Lost In Translation

A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...

PenTesting through Proxy Chaining

Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...

Catch Me If You Can

One thing I really missed out this year is RSA Conference APAC 2013's closing by the all-famous Frank Abagnale. On the bright side, I...

Save the World & Get the Girl

Javvad Malik – named the “Most Entertaining Blogger” & “Best Video Blogger” at the European Blogger Awards 2013 – presented “How...

Who's Really Attacking Your ICS?

Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...

What Facebook Knows About You?

These are the data/information you provide to Facebook: Name City of birth City of residence Phone Email Current employment Previous...

BLOG: Blog2
bottom of page