Very recently, we have been made aware of the remote vulnerability in libSSH.
At first, it didn’t worry us. However, it does now.
The exploitation of the flaw is trivial in nature, an attacker only needs to send an “SSH2_MSG_USERAUTH_SUCCESS” message to a server with an SSH connection enabled when it ...
This privacy policy has been compiled to better serve those who are concerned with how their ‘Personally identifiable information’ (PII) is being used online.
PII, as used in US privacy law and information security, is information that can be used on its own or with other info...
We are currently in the Fourth Industrial Revolution, and no aspect of life has been affected by the impact of these revolutions more than the job market.
We can view each of these revolutions as infliction points, points where the entire fabric of the job market was rocked to the core. At the heart ...
Between 21 and 25 August, the British Airways website was compromised and leaked 380 000 customers credit card and personal details to an elite and organized crime unit called Magecart.
Magecart has pulled this hack before in masterfully skilled hacks on Ticketmaster and Newegg. This team ...
Pen Testing has been around for decade. However, in my opinion, it has changed over the years and there seems to be a lot of confusion out there about what Pen Testing actually is.
In this article, I will unpack what I believe Pen Testing is, why people need a Pen Test and what should happen after a ...
(308)
(8)
(11)
(9)
(20)
(10)