The Psychology of security
Why do we continue to live with the situation that we have? Why are we willing to live with risks? It has been shown from the ever capable Bruce Schneier…
Defend Your Systems
Why do we continue to live with the situation that we have? Why are we willing to live with risks? It has been shown from the ever capable Bruce Schneier…
Will your company ever ask this question? Hopefully the FBI does not call you … As Jim Aldridge from Mandiant says in this youtube video the first thing that will…
As everyone knows – there are 7 OSI network layers. Microsoft explains And this is my favorite Open Source Interconnect (OSI) diagram: So what do I mean about the “8th…
CSRF or Cross Site Request forgery is the highest likely method of attack Broken Authentication is second And cross-site scripting(XSS) is third SQL Injection as well as security misconfigurations are…
Hydra, w3af, Scapy are all good as well. We can create our own scans using scapy – as we can create our own scan reviews depending on the environment that…