Blog

Latest news around the world

08

Jul'19

How to Guard Your Ecommerce Store From a Data Breach by Graeme Caldwell - Graeme

An ecommerce store is a valuable source of information for cybercriminals, but basic security precautions are enough to keep most stores safe.

Read More

08

Jul'19

9 Google Chrome Security Tips by Kelly O'Hara

When you have a Google account, there’s more at risk than you may have realized. Cybercriminals could gain access to your private emails, or even private work emails, via Gmail. You may also store sensitive files in Google Docs or Google Sheets, all of which are connected to your one account.

Read More

03

Jul'19

Linux System Hardening - Configuring ufw [FREE COURSE CONTENT]

This video comes from our Linux System Hardening course. The workshop itself goes into a lot of useful detail for …

Read More

28

Jun'19

OpenBSD 6.4: Installing a Seriously Underrated OS in a Virtual Machine by Frederik Kreijmborg

OpenBSD is perfect for older computers. If you have hardware that is too slow (or too sacred) to be operated with Windows or MacOS, you could resurrect it by installing OpenBSD or a lightweight Linux distribution.

Read More

28

Jun'19

The Truth about Smart Contracts by Jimmy Song

Much like the words “blockchain”, “AI” and “cloud”, “smart contract” is one of those phrases that get a lot of …

Read More

26

Jun'19

Is DNS The Weak Link In Your Cybersecurity Strategy? by Matthew Davis

DNS hijacking attacks, which can be used to redirect a server hosting client’s traffic, are on the increase, says the Department of Homeland Security. Because DNS is such an important aspect of a business’s online presence, it’s worth considering any potential security weaknesses.

Read More

21

Jun'19

How I use Raspberry Pis for HomeKit automation by Adam Argo

I saw a HN post titled How I use my Raspberry Pis to help me work on with my side projects, …

Read More

19

Jun'19

Web App PenTest Reporting - Introduction to writing a penetration testing report [FREE COURSE CONTENT]

Presented video will introduce you to the art of writing perfect penetration testing report. In this special tutorial that comes …

Read More

18

Jun'19

Blockchain Technology: Can It Open A New Front In Cybersecurity? by Jeshin Jayamon, Saurabh Sortee and Anoop Rao

Cybersecurity is getting critical as cybercriminals continue to exploit new vulnerabilities and cyber-attacks show no signs of abating. As such, …

Read More

17

Jun'19

Universal Radio Hacker: Investigate Wireless Protocols like a Boss

This article is from Open Source Tools edition, that you can download for free if you have an account on our website. Refers to URH version:  1.9.1 …

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013