Industrial Ethernet

| | Industrial Ethernet
Introduction Industrial Control Systems (ICS) are different from conventional IT systems. ICS typically source data from remote sensors and transmit commands to machines for the relevant action to... Go on to the site to read the full article ... Read More
4 Times a Security Breach Was Narrowly Avoided

4 Times a Security Breach Was Narrowly Avoided

| | Security Awareness
Introduction We’ve all heard of prominent companies who have been a victim of a data breach. Little to no attention, however, is given to organizations that narrowly avoided security-shaking... Go on to the site to read the full article ... Read More

What is Malware Obfuscation?

Introduction Malware has been a threat to companies and individuals since the 1970s, when the Creeper virus was first discovered. Since then, the globe has faced threats from hundreds of thousands of... Go on to the site to read the full article ... Read More

Ethical hacking: BYOD vulnerabilities

| | BYOD Vulnerabilities
Introduction With the influx of millennials and rising demand for flexible employment, the transition from using corporate devices to personnel bringing their own devices is having a significant... Go on to the site to read the full article ... Read More

Debugging Basics

| | Debugging Basics
Introduction The journey to coding mastery will come with a few bumps in the road. Some can be easily resolved by taking a closer look at the code. Others, however, give the learning coder the... Go on to the site to read the full article ... Read More
Abusing email rules

Abusing email rules

| | Security Awareness
Introduction For the average email user, setting up rules like automatic email forwarding is a harmless exercise. But for the individual whose role it is to prevent security breaches and achieve... Go on to the site to read the full article ... Read More

Ethical hacking: Top 10 browser extensions for hacking

Introduction When it comes to ethical hacking, one of the critical skills you need to succeed is the usage of various tools to start your penetration testing process. While browser extensions may not... Go on to the site to read the full article ... Read More

Be aware of these 20 new phishing techniques

| | Security Awareness
Most of us have received a malicious email at some point in time, but phishing is no longer restricted to only a few platforms. The evolution of technology has given cybercriminals the opportunity to... Go on to the site to read the full article ... Read More

32 hardware and firmware vulnerabilities

| | General Security
Introduction Hardware and firmware vulnerabilities can put your business and your customers’ sensitive data at risk, costing you in diminished sales, reputation loss and penalties. Most of them... Go on to the site to read the full article ... Read More

7 most common application backdoors

| | General Security
Introduction The popular adage “we often get in quicker by the back door than the front” has withstood the test of time even in our advanced, modern world. Application backdoors have become rampant... Go on to the site to read the full article ... Read More
Loading...