Fake Verizon email with malicious ZIP in circulation
Microsoft is warning users about a fake Verizon notification which is carrying a Trojan. The email appears to come from …
Emma Watson Adobe Flash Trojan dropper in circulation
Emma Watson Adobe Flash malware in circulation. The latest of these videos purportedly features popular English actress Emma Watson and …
How identity fraudsters steal your overdraft facility
Fraudsters are smart, so much so that they know how to outwit the banks security, clearing system and best of …
UKChatterbox IRC website personal data stolen
Popular UK IRC service UKChatterbox has commenced advising users to change their passwords following a databreach which culminated in compromised …

How to use the deep web as a force for good: Internet 2.0, Hyperreality and net neutrality
Introduction The deep web houses the dark web’s illegal and provocative material, this paper will attempt to use the deep …
"I've observed a prevailing misconception surrounding the Dark Web" - Interview with Goce Stevanoski
How did you first become aware of the dark web, and what sparked your interest in it? My interest in …
The Social dangers of the dark web
Introduction Using the deep web takes a lot of responsibility, maturity and discipline, as it contains all sorts of malice …
How to protect yourself on the deep web: Tools, evaluation, legality and expectations
This article will provide a comprehensive view in relation to using the deep web. Introduction The deep web can be …

Kismet Wireless: Network Monitoring and Analysis (W72)
Welcome to the In-Depth Course on Kismet Wireless! This comprehensive course is designed to provide you with a deep understanding …
Web Application Penetration Testing (W71)
Enter a short description of the course.
Mastering ChatGPT for Security Applications (W70)
Enter a short description of the course.
Hacking Blockchain based APIs (W69)
Have you ever wondered what the mysterious world of Blockchain is all about? Maybe you have only heard about it in regards to Bitcoin. Blockchain is much more than just a cryptocurrency financial system. With Blockchain, we can push the boundaries of what is possible within the realm of networking and cybersecurity. Join me as we launch a digital adventure into the world of Blockchain based APIs.
