Lucas Maclaud Official

Cyber Counter-Terrorism: Shutdown

Breaking through the vulnerabilities of fear From here, a perspective will be addressed regarding the power of information security as …

Mar 08,2023

12 min read

Hakin9 TEAM

Changing Passwords Regularly is Doing More Harm Than Good

Changing Passwords Regularly is Doing More Harm Than Good How often do you change your passwords? Every month? Every year? …

Jun 09,2016

4 min read

martaziemianowicz

Cybercrime and Cybersecurity – The Legal and Regulatory Environment by Colin Renouf

In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.

Aug 11,2015

1 min read

1
Dr. Berker KILIC OfficialNew Edition

Cyber Warfare Methodologies and Case Studies

Introduction In the ever-evolving landscape of modern conflict, cyber warfare methodologies have emerged as powerful tools in the arsenals of …

Nov 29,2023

9 min read

Matthew Maynard OfficialNew Edition

Hook, Line and Cyber: Navigating the waters of Phishing

Phishing is a type of social engineering and scam where attackers deceive people into revealing sensitive information or installing malware. …

Nov 22,2023

7 min read

Sylvester Kaczmarek OfficialNew Edition

Space Cyber Hacking

About the Author Sylvester Kaczmarek works on secure, interpretable, and explainable intelligence capabilities and next-generation secure data management for machines. …

Nov 17,2023

18 min read

Carlos Obeid OfficialNew Edition

Overview of Data privacy in the Middle East

It is already a known fact that the risks increase as we become more technology dependent.  During the last decades, …

Nov 09,2023

9 min read

1
Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …

Sep 14,2023

9 min read

Youssef Khaoulaj Course

Web Application Penetration Testing (W71)

Enter a short description of the course.

Aug 30,2023

8 min read

1
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.