5 Business Email Compromise Attack Examples We Can Learn From

/ / Phishing
Business email compromise (BEC) is a type of phishing scheme where the cyber attacker impersonates a high-level executive (CIO, CEO, CFO, etc.) and attempts to get an employee or customer to... Go on to the site to read the full article ... Read More
Top 5 Password Managers in 2017

Top 5 Password Managers in 2017

Introduction The Password manager generates and retrieves complex and long passwords that are extremely difficult to guess, and stores these passwords in an encrypted database for safe and quick... Go on to the site to read the full article ... Read More
Top 10 Tips for Keeping Your Smartphone Secure

Top 10 Tips for Keeping Your Smartphone Secure

Introduction In this digital era, with the increasing technological advances, handheld devices have gained much importance in our lives. In recent years, with the advent of multitasking and... Go on to the site to read the full article ... Read More
Pentester Academy Command Injection ISO: AjaXplorer 2.5.5 Exploitation

Pentester Academy Command Injection ISO: AjaXplorer 2.5.5 Exploitation

/ / Penetration Testing
Introduction: The Pentester Academy has created a virtual machine that consists of various vulnerable real-world applications. These applications are vulnerable to the “Command Injection”... Go on to the site to read the full article ... Read More
Disaster Recovery Types

Disaster Recovery Types

/ / Hacking
Before understanding the various methodologies and techniques for disaster recovery, it is essential to know what the term “disaster recovery” means in the first place. A disaster can be... Go on to the site to read the full article ... Read More
Pentester Academy Command Injection ISO: Basilic 1.5.14 exploitation

Pentester Academy Command Injection ISO: Basilic 1.5.14 exploitation

/ / Hacking
Pentester Academy has launched a Command Injection ISO virtual image of Ubuntu. This image has 10 real-world application that has vulnerable application framework. Remote code execution is possible... Go on to the site to read the full article ... Read More
Managing Access Control

Managing Access Control

/ / Access Control Categories
Security is one of the major prerequisites for any system. Any design should be secure from the point of the user, data, security from the point of business. The common practices to date have been to... Go on to the site to read the full article ... Read More