General security

The cyber exploitation life cycle

For the purposes of this article, the term "cyber exploitation" will represent all the subversive activities that include interstate "breaking and entering"

What is behind that QR code?

With the huge popularity in mobile devices like the smartphone and tablets, two dimensional barcodes, or the so-called QR codes are beloved by marketers. QR

Pimp my Chrome

You might be wondering about the title. Let me tell that you shall have your answer by the end of this story. Hacking has been considered as a mysterious ac

Mobile working – prepare for the worst, deal with the fallout

What if, either from misuse or loss of your organization's mobile technology, your organization's information is compromised? What if, in spite of all the co

Legal Aspects of Online Gambling

1. Introduction Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling C

Hacking E-banking

1. Introduction E-banking is an interesting target for attackers. The easiest way of stealing money in e-banking is to attack its weakest point – the client

Cyber Exploitation

Introduction Over the past couple of years, cyber exploitation has established a reputation of something more than mere nuisance. The repercussions of these

InfoSec Institute Interview: Alexander Polyakov – CTO at ERPSCAN

How it started It started pretty much as usual. When you have a ZX Spectrum at home as a child, you will turn to the technology area anyway, but the questio

Identity Management Solutions

Identity management as a platform is an emerging branch of Information security. Top vendors such as Microsoft, IBM, and Oracle have taken serious plunges in

Cyber-espionage: The greatest transfer of wealth in history

Introduction In recent months, the world-wide security community has discovered many cyber espionage campaigns that hit governments, intelligence agencies an