• LOGIN
  • No products in the cart.

All posts by Marta Sienicka

20

Nov'17

Cost-Saving Strategies for Cyber Security Implementation

Cyber security has never been more important. With recent data breaches impacting government’s, credit agencies, banks, and businesses, security issues …

Read More

20

Nov'17

10 Things You Didn’t Know About Java

Many of you might have been working with Java since its beginning. And, for many of you, you might just …

Read More

15

Nov'17

Testing Checklist: How To Test A Mobile App

  It’s a fact of life today that many businesses need mobile apps to be competitive. Consumers these days expect …

Read More

27

Oct'17

What is Cybercrime? 4 Common Forms of Cybercrime

Cybercrime can be defined as any criminal activity in which a computer (or networked device) is targeted and/or used. Some …

Read More

24

Oct'17

The potential of the weaponization of quantum computing by Paul F. Renda

By Paul F. Renda, E-mail: [email protected] Okay, so what is quantum computing? It is the next integration in the evolution …

Read More

23

Oct'17

BOVSTT – Buffer Overflow Vulnerability Services Tester Tool

Author: Ivan Ricart Borges Platform: Microsoft Windows IDE: DEV-C ver-4.9.9.2 Compiler: MinGW Dependences: Libwsock32.a Version: 2.5 Project: https://github.com/iricartb/buffer-overflow-vulnerability-services-tester-tool Mail: [email protected]

Read More

20

Oct'17

Why hackers will use GDPR to their advantage by TSG

Hackers are going to come for your data with more force than ever. Your data is about to become your …

Read More

17

Oct'17

There is a shell in your lunch-box by Rotimi Akinyele

My team was recently engaged by a client (Hackme) to perform a black-box external penetration test. The objective was simple …

Read More

21

Sep'17

12 Cyber Security Tools Every IT Pro Should Have by Brent Whitfield

When a security breach is suspected or revealed, the IT pro springs into action. Most experienced IT professionals will have …

Read More

17

Sep'17

Why More Businesses Should Hire Hackers by Kayla Matthews

Your idea of hacking might involve people who do their deeds in secret to steal information or get revenge. Some …

Read More