hacking

17

Oct'15

NeXpose and Metasploit Pro Hacking

  Dear Readers, This new issue of Hakin9 Magazine is coming out today. I hope that my words find you …

Read More

03

Sep'15

Episode 2 of The Cynja comic!

Dear Readers, We would like to present you second episode of CynjaSpace. Enjoy! Cynja's website CynjaSpace Twitter @TheCynja    

Read More

02

Sep'15

31

Aug'15

First CynjaSpace Comic!

Hi Folks, Today we would like to present you first episode of CynjaSpace comic! Cynja's goal is to engage kids when …

Read More

19

Aug'15

THE HACKER TALES – eForensics Magazine Open Issue

Hi Folks, Today we would like to share with you a free magazine issue by eForensics Magazine. Thanks to Security …

Read More

14

Aug'15

11

Aug'15

Cybercrime and Cybersecurity – The Legal and Regulatory Environment by Colin Renouf

In this article we will look at the environment in which eForensics exists; the legal and regulatory regimes in which systems and cyber criminals operate. We perform forensic analysis on systems to investigate a crime and hopefully prosecute a criminal; but to do that we need to understand which laws and regulations have been broken. There are pitfalls in working out what laws and regulations are in operation for a particular context; as what is illegal in one regime may not be in another, and is it the law in the location of the system or the criminal that applies? The information here forms the underlying legal knowledge in the CISSP certification and underpins the International Information Systems Security Certification Consortium (ISC)2 body of knowledge.

Read More

07

Aug'15

Hacker Profile by PC Magazine UK

Source: http://uk.pcmag.com/opinion/35346/what-are-hackers-thinking

Read More

17

May'15

Backend Database Hacking - Workshop eBook

We will be extremely focused on talking about tricks and techniques used for hacking into databases and underlying operating system. We will also lay down the general and core concepts for understanding the databases, like how they work, why they are used and what are the known vulnerabilities or weaknesses to exploit and gain illegitimate access. Microsoft SQL Server and MYSQL server are the two main database servers we will be discussing.

Read More
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2013