Mac OS X Little Snitch defines who you can trust
If you use a Mac and you want to manage and control the flow of data that leaves your computer, …
iPhone BlackBerry and Android motion sensor exploit
A team of researchers have devised an experimental Android-based Trojan called TapLogger that can manipulate the mobile onboard motion and …
Mac Trojan exploiting malformed Word documents
The Mac OS X platform has now been targeted for a second time by a Trojan called SabPub (Backdoor.OSX.SabPub.a). Several …
The Single sign-on universal login security debate
The more apps and websites we register with, the more usernames and passwords we need to remember. You might end …
Cyber Kill Chain: Reconnaissance
No wonder that cyber threats pose a significant risk to all of us be it individuals, organizations and nations. Cyber-attacks …
Unveiling Cyber Threats: Understanding Reconnaissance in the Cyber Kill Chain and the importance of Threat Intelligence
Introduction Many enterprises have significantly improved their cybersecurity posture the past decades, effectively preventing known attacks through the integration of …
Methods for Analyzing the Human Resource Aspect of Cybersecurity and Espionage
Introduction In the cybersecurity landscape, the concept of "watchers" encompasses a range of roles and intentions, each with its own …
Unveiling Digital Shadows: Understanding Modern Reconnaissance Techniques
In today's digital age, our online activities leave behind a trail of data that various entities meticulously collect and analyze. …
AWS Security Essentials: Building a Resilient Cloud Defense (W74)
"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.
Create Your Own Command & Control Tool with Golang (W73)
Enter a short description of the course.
Kismet Wireless: Network Monitoring and Analysis (W72)
COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …