General security

Human Resource Management in Agile - Part 2

Part one of this article series can be found here: Human Resource Management in Agile Part 2. From the previous article you could find out what mistakes you

Social Media & Security Risk

Social media is the two way communication in Web 2.0 and it means to communicate / share / interact with an individual or with a large audience. Social media

Chapter 11 – Identity management and access controls

Access controls help us restrict whom and what accesses our information resources, and they possess four general functions: identity verification, authentica

Achieving anonymity with Tor Part 5: Tor bridges and hidden services

Running a Tor bridge is essentially the same as running a Tor relay, as far as configuration is concerned. We already mentioned that the only difference is t

Achieving Anonymity with Tor Part 4: Tor Relays

1. Introduction We've seen that Tor network is constituted from Tor nodes, through which we tunnel our traffic to reach anonymity. So far we didn't bother wi

Achieving Anonymity with Tor Part 3: Torbutton and Tsocks

1. Introduction In previous articles: Part 1 and Part 2 we extensively used the Tor Browser Bundle that helps us ensure our anonymity. With the Tor Browser B

Achieving Anonymity with Tor Part 2: Proxies and DNS servers

1. Using Burp with Tor So far we've looked at how to set up our web browser to use Privoxy, which in turn uses Tor to achieve anonymity on the Internet. But

Interview with Project Leader Sebastian Poeplau

Introduction Malware threats have become very common these days. In the past, many honeypots have been created to detect malware propagation over the netw

The Evolution of a Technical Information Security Professional

During my years of work as a consultant and trainer in the information security world, I've noticed a few patterns that usually exist in those who do very we

Risk Management in Agile

In this article, we will explore the business concerns of Agile methodologies in project management. Recently, I read an article by Chris Matts and Olav Maas