Browser Security: The Worst Code Injections and How They Work

Browser Security: The Worst Code Injections and How They Work

What do browser-based attacks have in common? They target locally installed browsers through malicious code injects ... Read More
Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks

Defensive Strategies Industrial Organizations Can Use Against Cyber Attacks

Industrial organizations are prime targets for spies, criminals, hacktivists and even enemy countries. Spies from rival organizations seek ways to access industrial control systems (ICS) so they can steal intelligence and technology and gain a competitive advantage. Criminals look for ways to ransom companies by locking down IT systems. Hacktivists ... Read More
How to protect your VPN from Data Leaks

How to protect your VPN from Data Leaks

The following news story was reported by the Nine Network just a week after New Year’s Day: an English teacher from Sydney was surprised when she found that her Facebook account was changing in strange ways. Jennifer Howell first noticed that her profile photo had changed, thus prompting her to ... Read More
Security experts, Wolf Halton and Bo Weaver, discuss pentesting and cybersecurity [Interview]

Security experts, Wolf Halton and Bo Weaver, discuss pentesting and cybersecurity [Interview]

This is Part 2 of the interview with our two Kali Linux experts, Wolf Halton, and Bo Weaver, on using Kali Linux for pentesting. In their section, we talk about the role of pentesting in cybersecurity. Previously, the authors talked about why Kali Linux is the premier platform for testing ... Read More
Kali Linux 2018 for testing and maintaining Windows security – Wolf Halton and Bo Weaver [Interview]

Kali Linux 2018 for testing and maintaining Windows security – Wolf Halton and Bo Weaver [Interview]

Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of Windows security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS ... Read More
Go Phish! What do thieves get from stealing our data?

Go Phish! What do thieves get from stealing our data?

If black hats were sharks, then our emails would be a school of innocent, unsuspecting guppies nonchalantly drifting along. For black hats or malicious hackers, getting into the average person’s email is as challenging as overeating at a buffet. After all, e-mail is the most successful federated communication system ever ... Read More
Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking messages. If an illegitimate email tries to persuade you to click a link and enter personal information, then it is classified as a phishing attack. Phishing ... Read More
5 lessons public wi-fi can teach us about cybersecurity

5 lessons public wi-fi can teach us about cybersecurity

Free, public Wi-Fi is now crucial in ensuring people stay connected where a secure network is absent or mobile data is unavailable. While the advantages of flexible internet access are obvious, the dangers are often less clear. By now, most of us are aware that these networks can pose a ... Read More
Browser Security: What's Up with WASM?

Browser Security: What’s Up with WASM?

WebAssembly, a newer type of “low-level” code that can be run by modern web browsers, is aimed at improving the web experience. The catch: Regular browsers execute such code locally. WebAssembly - merely a faster way for web-borne exploits to reach the local browser? * WebAssembly (WASM) is currently supported ... Read More
8 Things That Go Bump In Your Browser. Not Only at Night.

8 Things That Go Bump In Your Browser. Not Only at Night.

Abandon hope all ye who launch your browser. Here’s how to turn any old day into an inescapable, never-ending Halloween nightmare. Be prepared to get scared out of your wits ... Read More