CYBERSEC Dumping On Dummies Join security researcher Keiose in her exploration into the notion that there is insufficient testing in kinetic based weapons systems across the US military.
CYBERSEC Predicting 2018's Bah Humbug Christmas infosec predictions, the hopelessly generic forecasts, the bland Christmas-themed attacks and outdated predictions recycled from three Christmases ago.
CYBERSEC Social Engineering 0x01 ~ An Introduction to Hacking People The most vulnerable thing about your workplace is the people in it. We, as humans, do not have things like security hot-fixes or patches, yet we have some of the biggest flaws ever seen.
INFOSEC How Not to CISO - Tools Before Capabilities Tools are stepping stones in maturity and capability within an organization. In this article we take a look at how not to approach investing in infosec tools.
CYBERSEC How To Handle A Data Breach Crisis ‘Crisis’ is not a word that sensible people like and is best avoided altogether. Let's imagine that a cybersecurity crisis ambushes you when you least expect it.
INFOSEC The Browser Is A Bitch We love browsers, they are our window to the world, we love browsers so much that we have fought wars over them, but sadly the browser is not your friend.
INFOSEC Lets Talk About Ciphers Ciphers have been used since ancient times for sending encrypted messages which could not be read if they were intercepted by a third party.
CYBERSEC Playing In The Dark Corners Of Windows With Alternative Data Streams In this article we look at the exploitation of ADS in the NTFS file system to conceal data secretly using the Stealth Alternative Data Stream, which cannot easily be detected.
INFOSEC From Passwords To Web Authentication Passwords safe aren't here to stay. Yet they are still needed. Read where we are with web authentication and where we are going.
INFOSEC How To Market Yourself As An Information Security Professional Ever wondered how best to market yourself as an infosec professional? In this article we will take some words of wisdom from Dr Seuss on how best to get ahead in the infosec world.
INFOSEC Are You Secretly Mining Crypto Currency? You may never know if you are mining cryptocurrency or not these days, join security researcher Roy Shoemake as he explores the wonderful world of stealth cryptomining.
INFOSEC Unboxing India's Data Protection Framework – Part Two of Many Cybersecurity professional Ninad Dhavase takes a further deep dive into India's data protection framework, breaking it down into easily understood chunks.
INFOSEC DEF CON Groups: What Works in 2018? Thinking about starting your own DEF CON group? Join security researcher Lacey Kasten in an investigation into what works and what doesn't in 2018.
INFOSEC The DOD Has Its Head in the Clouds The Department of Defense spends roughly $38 billion dollars a year alone on information technology that supports two million users and 10,000 operational systems.
INFOSEC SANS Holiday Hack Challenge - Part 2 Part two of security researcher Roy Shoemake's SANS Holiday Hack Challenge, lets take a closer look at the primary technical challenges and overcome them.
INFOSEC SANS Holiday Hack Challenge – Part 1 The Untold Story of the Elves at the North Pole. Giant snowballs are causing destruction at the north pole, find out who the villain is and their motive.
INFOSEC Hiding In Plain Sight With NTFS Steganography Steganography is the art of hiding data in plain sight, in this article Nihad Hassan takes a closer look at hiding data using the NTFS file system.
INFOSEC Unboxing India's Data Protection Framework – Part One of Many In this article, infosec writer Ninad dissects the Indian Data Protection Framework and breaks it down for us so that we can better understand it.
CYBERSEC Featured The MEGA.nz Chrome Browser Extension Has Been Backdoored (UPDATE) The MEGA.nz Chrome Extension has been identified as backdoored in the newest version. It is stealing credentials for several services like GitHub and Google, which will be sent to an external website.
INFOSEC Infosec Writers Contest Sharpen your pencils and scribble up a storm, you have 3 weeks to submit an article and enter our $1000 writing contest.
INFOSEC Black Hats Drive The Infosec Space We pretend that 'black hat' is a dirty term in the infosec space, but half of you would not earn half as much money as you do without them.
INFOSEC Apply For Infosec Jobs Like You Mean It Learn how to apply military strategy to your job hunt and apply for infosec jobs like you mean it, with security researcher Stuart Gentry.
INFOSEC Cryptology : The Original Crypto Cryptology is the art and science that deals with both cryptography and cryptanalysis, lets dive into its two main components.
TECHNICAL Finding The Real Origin IPs Hiding Behind CloudFlare or Tor Tor hidden services and reverse-proxy providers (e.g. CloudFlare) are useless if you are making simple mistakes. This is how you can reveal origin IPs when you make a mistake.
INFOSEC GhostShell - My Hacktivist Ideology I did a lot of things over the years, from publicly declaring cyberwar on political leaders, to hacking Wall Street and other high profile targets such as NASA, The Pentagon and FBI.