General security

The importance of an effective VPN remote access policy

With the number of employees telecommuting, traveling often or working remotely on the rise, the conventional corporate security model is undergoing a major

SAML, OAuth, OpenID

Introduction In this article, we are going to see what are federation, single sign-on, and three federated identity standards, namely Security Assertion and

Dockerizing a Sample GUI Application: Case Study

The goal for this article is a sprint from never using Docker to using it to deploy a GUI application that only has a console deployment pattern for Docker.

Defense-in-Depth: Layered Protection and Data Security

Application vulnerability is caused when a developer fails to sanitize the input from user and blindly uses it as an input for further data processing. One o

The Evolutionary Approach to Defense

By: Philip Nowak The evolutionary approach to IT security seems to be the most natural and efficient way to resist cyber-attacks. The Red Queen Effect descri

Privacy Risks of Sleep-Tracking Devices

1. Introduction According to the technology market intelligence company "ABI Research", there are currently more than 10 billion wirelessly connected devices

Clickjacking, Strokejacking or UI Redress

Introduction Clickjacking was first publicized by Jeremiah Grossman and Robert "Rsnake" Hansen in 2008. Clickjacking is an attack that is possible only by th

How a DNS Sinkhole Can Protect Against Malware

The Domain Name Service (DNS) is an integral part of Internet access. It translates human-recognized domain names into computer-readable IP addresses in orde

Data Backups with Bacula: Mobile Devices

Introduction Bacula was specifically designed for backup jobs in a server environment, where servers have IP addresses that don't change regularly and are al

Phishing WhatsApp Images via USB, From Python With Love

Introduction How many times did your work colleague or a friend of yours find a USB cable from your PC/Laptop and attach his Android phone to recharge its ba