by on August 17, 2017
Undeniably, Kali is the best choice of Linux distro for Penetration Testers, Bug Bounty Hunters, and Security Researchers (if you think differently, please comment below). It carries a completely open source tools to perform the “Kill Chain“. However, many users tend to overlook the aspect of fine tuning the arsenal and launching a Vulnerability Assessment and PenTest (VAPT) right away. As a best practice, hardening and tweaking should be the first thing to do in every operating system after t...
41 views 0 likes
by on August 4, 2017
Recently we posted about how ads track you across the net and showed you how to save enough money to adopt a pony! #ChildhoodDream Unless you use a private search engine, like DuckDuckGo, then your search engine still likely has a copy of everything you’ve ever searched. Let’s take Google for example. Check out your Google Search History: searches, locations, interests. They’ve recorded it all. Deleting your Google search history will prevent it from being used by the highest bidder on the mi...
41 views 0 likes
by on July 24, 2017
By far one of the hottest topics in the cloud industry is security. It is a legitimate concern for anyone that is connected to the internet and/or using a cloud service. With the hacktivist group Anonymous making headlines and large companies suffering data breaches, it is no wonder security is a concern. There is currently an estimated 7 billion mobile devices and over 1 billion PCs now in the world. There is approximately 7.3 billion people on earth. That means the potential of hackers is ve...
38 views 0 likes
by on July 19, 2017
Given that most of us carry our smartphones 24/7, you’d expect them to be secure 100% of the time. You’d be wrong. Security threats to our mobile device are here to stay, and even more concerning – they’re on the rise. In 2016, McAfee reported detections of 100-1000 malware infections per hour in the US and several other countries worldwide. In late 2016, they predicted ransomware would pose a significant threat through the first half of 2017. In the same report, McAfee predicted Adobe Flas...
32 views 0 likes
by on July 19, 2017
There is something innately exciting about going shopping online and waiting for your purchase to arrive, it’s like you’re expecting a gift — even though you payed for it! The latest stats prove how popular ecommerce is: in the U.S. alone, 51% of Americans prefer to shop online and 96% have made an online purchase in their life. In fact, ecommerce is growing 23% year-over-year with online orders increasing 8.9% in Q3 2016. Breaking it down to generational trends, 67% of Millennials and 56% of Ge...
37 views 0 likes
by on July 19, 2017
Remember the days you had to be at work to work; go to the post office to pay a bill; visit a travel agent to book a trip; go the bank to do transactions; and drive to a store to buy clothes? Well, the internet has made our lives easy as we can do all these things and more without lifting a finger. Our lives are more efficient albeit it more hectic (ironically) and we get more done in less time. However, since internet networks first appeared, it opened the floodgates of freedom — for us, but...
37 views 0 likes
by on July 19, 2017
You’ve just wrapped up that novel you’ve been slaving at for years; finished the make-or-break confidential report for your boss; perfected the spreadsheet containing all your client’s accounts. Most of your work was done in Microsoft Word docs and Excel, and are stored locally on your computer. After completing all of this work you’re patting yourself on the back and sitting back for some well-deserved R&R. But you messed up. Mistake number one — you do this before sending the documents over to...
33 views 1 like
by on June 27, 2017
Data is a piece of information which is very important and useful for a user. With your personal data like bank details, contacts, messages and Professional data like confidential documents, presentations, emails accounts or server organizations. Data could also be traveling through wired or wireless networks. At all locations, your data is always at risk from intentional and unintentional breaches. And remember, deleted data can always be recovered. Your data on social websit...
30 views 2 likes
by on June 27, 2017
This particular list is due to the seriousness of mobile security testing which is a grossly overlooked and ignored area and probably one of the if not the most important. As I predicted in my 2014 article “Security Testing for Critical for 2015” – security is still in it’s infant stages. Seems we are still in the reactive mode instead of the proactive mode. Security criteria for apps on all the platforms to be added to store is minimal at best. Back in late 2014-2015 myself and the QA Conspi...
27 views 0 likes
Page generated in 0.1294 seconds with 65 queries and GZIP enabled on 45.56.101.149.