2018

Video: Blockchain Hacking for Investigating Cryptocurrencies

Video and Slide Deck from EH-Net Live! Oct 2018 Follow the money. Be it business, politics or crime, this is…

2 years ago

Latest security tests introduce attack chain scoring

When is a security breach serious, less serious or not a breach at all? Latest reports now online. UPDATE (29/10/2018):…

2 years ago

The Evaluation: Stage 1 – Definition of the Problem to be Solved

I need a better pen. That statement may mean something dramatically different depending on who just said the words. In…

2 years ago

Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018

Register Now to Learn Blockchain Hacking Step-by-Step! Nick Furneaux, forensics trainer, investigator & author of "Investigating Cryptocurrencies" takes you through…

2 years ago

Video: Basics of IoT Hacking for the Career Pen Tester

Video and Slide DeckEH-Net Live! - Basics of IoT Hacking - Watch Full Webinar from EH-Net Live! Sept 2018 IoT…

2 years ago

Network security appliances vs. Word and PowerShell

Over the last few months we have seen a surge in attacks using apparently innocent documents that install malware covertly…

2 years ago

Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

Register Now and Learn IoT Hacking Step-by-Step! Independent Security Evaluators (ISE), the people behind the IoT Villages of DEF CON,…

2 years ago