General security

Attacks over DNS

DNS is a naming system used for all devices connected to the Internet or a network. DNS is easy to remember instead of IP addresses for users. It is a method

Interview: Patrick Oliver Graf, NCP engineering

Patrick Oliver Graf is CEO, Americas, of NCP Engineering. His company sells its remote-access VPNs to government agencies and other organizations. A total of

Debugging Apps on Android Emulator Using GDB

This article shows how to debug a process running on a rooted Android device or emulator. Debugging a process is an essential task in order to find memory co

Securing Cookies Using HTTP Headers

In the previous articles in this series on defending against web attacks using HTTP headers, we have seen the usage of X-Frame-Options and X-XSS-Protection h

Interview: Chris Camejo, Director of Assessment Services for NTT Com Security

Chris Camejo, Director of Assessment Services for NTT Com Security (formerly Integralis), comes from a technical assessment background, having personally coo

Playing Hide-and-Seek with Metadata

We often go on at length about master data, reference data and hierarchies. After all, we discover and analyze these datasets, avoid duplicating them, insist

Rootkits: Kernel Mode

We have learned in part one of this series about the Rootkits and how they operate in User Mode; in this part of the series we will up the ante and look at t

Are You InfoSec Geek Enough? Take This Quiz and Let’s See What You Got!

I have prepared a simple quiz for you guys out there who are brave enough to test if you really are a certified InfoSec geek. Take note of the questions sinc

35 Awesome InfoSec Influencers You Need to Follow

I would like to share some security researchers and information security professionals you might have missed following. I think they deserve credit and some

Rootkits: User Mode

In this article, we will learn about what rootkits are and how they operate. The focus will be on two types of Rootkits exploits: User Mode & Kernel Mode