General security

General security
For the purposes of this article, the term "cyber exploitation" will represent all the subversive activities that include interstate "breaking and entering"

March 22, 2013
Dimitar Kostadinov
General security
With the huge popularity in mobile devices like the smartphone and tablets, two dimensional barcodes, or the so-called QR codes are beloved by marketers. QR

March 21, 2013
Bhavesh Naik
General security
You might be wondering about the title. Let me tell that you shall have your answer by the end of this story. Hacking has been considered as a mysterious ac

March 20, 2013
Karthik
General security
What if, either from misuse or loss of your organization's mobile technology, your organization's information is compromised? What if, in spite of all the co

March 19, 2013
John G. Laskey
General security
1. Introduction Since the website of the first online casino appeared in 1995, that time, the online gambling business has grown tremendously. H2 Gambling C

March 13, 2013
Daniel Dimov
General security
1. Introduction E-banking is an interesting target for attackers. The easiest way of stealing money in e-banking is to attack its weakest point – the client

March 05, 2013
Dawid Czagan
General security
Introduction Over the past couple of years, cyber exploitation has established a reputation of something more than mere nuisance. The repercussions of these

February 25, 2013
Dimitar Kostadinov
General security
How it started It started pretty much as usual. When you have a ZX Spectrum at home as a child, you will turn to the technology area anyway, but the questio

February 25, 2013
Alexander Polyakov
General security
Identity management as a platform is an emerging branch of Information security. Top vendors such as Microsoft, IBM, and Oracle have taken serious plunges in

February 15, 2013
Karthik
General security
Introduction In recent months, the world-wide security community has discovered many cyber espionage campaigns that hit governments, intelligence agencies an

February 13, 2013
Pierluigi PaganiniIn this series
- Digital points of failure: A shared need for cyber resilience
- Diving deep into data analytics and its importance in cybersecurity
- Free Valentine's Day cybersecurity cards: Keep your love secure!
- How to design effective cybersecurity policies
- What is attack surface management and how it makes the enterprise more secure
- Is a cybersecurity boot camp worth it?
- The aftermath: An analysis of recent security breaches
- Understanding cybersecurity breaches: Types, common causes and potential risks
- Breaking the Silo: Integrating Email Security with XDR
- What is Security Service Edge (SSE)?
- Cybersecurity in Biden’s era
- Password security: Using Active Directory password policy
- Inside a DDoS attack against a bank: What happened and how it was stopped
- Inside Capital One’s game-changing breach: What happened and key lessons
- A DevSecOps process for ransomware prevention
- What is Digital Risk Protection (DRP)?
- How to choose and harden your VPN: Best practices from NSA & CISA
- Will immersive technology evolve or solve cybercrime?
- Twitch and YouTube abuse: How to stop online harassment
- Can your personality indicate how you’ll react to a cyberthreat?
- The 5 biggest cryptocurrency heists of all time
- Pay GDPR? No thanks, we’d rather pay cybercriminals
- Customer data protection: A comprehensive cybersecurity guide for companies
- Online certification opportunities: 4 vendors who offer online certification exams [updated 2021]
- FLoC delayed: what does this mean for security and privacy?
- Stolen company credentials used within hours, study says
- Don’t use CAPTCHA? Here are 9 CAPTCHA alternatives
- 10 ways to build a cybersecurity team that sticks
- Verizon DBIR 2021 summary: 7 things you should know
- 2021 cybersecurity executive order: Everything you need to know
- Kali Linux: Top 5 tools for stress testing
- Android security: 7 tips and tricks to secure you and your workforce [updated 2021]
- Mobile emulator farms: What are they and how they work
- 3 tracking technologies and their impact on privacy
- In-game currency & money laundering schemes: Fortnite, World of Warcraft & more
- Quantitative risk analysis [updated 2021]
- Understanding DNS sinkholes - A weapon against malware [updated 2021]
- Python for network penetration testing: An overview
- Python for exploit development: Common vulnerabilities and exploits
- Python for exploit development: All about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: Programming, exploits and attacks
- Increasing security by hardening the CI/CD build infrastructure
- Pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
Get certified and advance your career!
- Exam Pass Guarantee
- Live instruction
- CompTIA, ISACA, ISC2, Cisco, Microsoft and more!