TalkTalk Cyber Attack Highlights the Risks to SMEs By Adam King
TalkTalk Cyber Attack Highlights the Risks to SMEs By Adam King Security Consultant at PGI Cyber I’m sure we’ve all …
Cybercrime and Cybersecurity – The Legal and Regulatory Environment by Colin Renouf
In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.

How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Kismet Wireless: Network Monitoring and Analysis (W72)
Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …
Web Application Penetration Testing (W71)
Enter a short description of the course.
Mastering ChatGPT for Security Applications (W70)
Enter a short description of the course.
Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
