Mac OS X Little Snitch defines who you can trust
If you use a Mac and you want to manage and control the flow of data that leaves your computer, …
iPhone BlackBerry and Android motion sensor exploit
A team of researchers have devised an experimental Android-based Trojan called TapLogger that can manipulate the mobile onboard motion and …
Mac Trojan exploiting malformed Word documents
The Mac OS X platform has now been targeted for a second time by a Trojan called SabPub (Backdoor.OSX.SabPub.a). Several …
The Single sign-on universal login security debate
The more apps and websites we register with, the more usernames and passwords we need to remember. You might end …
Revealing Killnet: The Power of Reconnaissance with DNSdumpster
In the ever-evolving landscape of cybersecurity threats, hacktivism stands out as a formidable force, challenging the norms of digital activism …
The Future of Satellite Communication: Optical Communication and Lasers. Is it Secure?
About the Author Angelina Tsuboi is a software developer and an aerospace cybersecurity instructor focusing on satellite systems. With over …
Safeguarding Earth's Frontline: The Crucial Role of Cybersecurity in Space Operations
The security of space assets has become paramount in our interconnected world, where space operations rely on a complex infrastructure …
Space Cybersecurity: a Strategic Issue in the Current Geopolitical Context
by Anaïs Shay-Lynn Vydelingum The security of space infrastructures is a geopolitical issue, as space-based resources are increasingly used by …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …
Web Application Penetration Testing (W71)
Enter a short description of the course.