Area41 Security Conference Report
This is to report and reflect the experiences and content of the recent Area41 security conference in Zürich on 2-3 June. The conference...
This is to report and reflect the experiences and content of the recent Area41 security conference in Zürich on 2-3 June. The conference...
Long gone were the days of networking when the end-users were aware of where she’s connected to and what are the live connections opened...
This writing is to criticise the somewhat pessimistic and at times also paranoid attitudes towards surveillance in the light of recent...
While having just landed from the BSides London conference, I had the good occasion presented by Emil Tan to contribute guest articles....
According to SANS Top Cyber Security Risks (Jul, 2010), attacks against Web applications make up more than 60% of the total number of...
You won't expect someone who gives cybersecurity awareness talks regularly to fall into simple clickbait scams do you? Well … I did. I...
Hello Facebook! My name is Kevin M. James. I am the manager of the BMW Marketing Group and I own 12 BMW’s. This is one of them, a brand...
I am a cryptocurrency enthusiast who has been into cryptocurrency for more than a year. I’m largely involved in Bitcoin and Litecoin...
Introduction to Dionaea Dionaea “the Nepenthes successor” is a malware capturing honeypot initially developed under The Honeynet...
Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...
A covert channel is used to transfer information between processes that aren't allowed to communicate as defined by the computer security...
A substantial security oversight is present in a variety of penetration testing tools, and it has to do with the different languages that...
Remote management tools have made many administrators’ job easier, allowing them to perform administrative tasks (e.g. reinstalling an...
The Internet of Things (IoT) [1] is defined as everyday objects being interconnected and networked. This includes smart-devices such as...
Unlike tools such as Nmap, Nessus, and Metasploit which are the de-facto tools used in different phases of the penetration testing...
One thing I really missed out this year is RSA Conference APAC 2013's closing by the all-famous Frank Abagnale. On the bright side, I...
Javvad Malik – named the “Most Entertaining Blogger” & “Best Video Blogger” at the European Blogger Awards 2013 – presented “How...
Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...
With Black Hat and DEFCON just a few hours away, here are some tips for those who are heading to Las Vegas, to stay secure and not fail...
These are the data/information you provide to Facebook: Name City of birth City of residence Phone Email Current employment Previous...