fbpx
Home Editorial

Editorial

Acunetix Web Application Vulnerability Report 2019

Acunetix compiles an annual web application vulnerability report. The purpose of this report is to provide security experts and interested parties with an analysis...

Amazon Releases New C++ Friendly Features

AWS (Amazon Web Service) has announced that they have opened up their serverless language support. This allows developers to bring their preferred coding language...

How to Create an Activity Log for WordPress Sites (And Why You Should)

One of the most critical aspects of web security is being able to monitor what happens on your site. To do this effectively, you could implement...

How to Recover from a Hacked Website Event?

Any fellow webmaster you may ask who is beyond the novice stage will agree that one of his top priorities will always be keeping...

A Security-focused Introduction to HTTP

HTTP is a ubiquitous protocol and is one of the cornerstones of the web. If you are a newcomer to web application security, a...

WinX MediaTrans: Transfer iOS Media Files without iTunes (Free License Giveaway)

One of the most common things that nearly everyone does these days is transferring media files to/from their mobile devices, tablets or desktops. Sometimes...

Mastering the Security of the Internet of Things

Internet of Things doesn't need an introduction, it is the widely adopted technology and the future will depend on it. The industry also needs...

5 Ways Cybercrime Harms Ecommerce

Cybercrime is a real threat to anyone doing business online. Target, Home Depot, Eddie Bauer, and Vera Bradley are among many retailers that have been hit...

Configuring Kali Linux in the AWS Cloud with Public IP?

Problem carrying your Kali Linux with you? Or are you struggling hard to get the public IP associated with Kali Linux? Both and many...

How to Become Anonymous on the Internet – 2017?

Darknet is not a mystery at all, most people know about it and the rest of them wants to know about it. If you...

Top Cybersecurity Predictions For 2017

Cyber threats are growing in number and strength and the future of cyber security is looking ever more complex and challenging. The number of...

Cyber Security Training – Black Friday Sales

Again EH Academy is here with its Holiday Season deal that no one else can offer!! Avail straight 75% off on all courses at EH...
- Advertisment -

Most Read

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...

Cyber Physical Systems for Smart Grid Applications

The smart grid is an emerging paradigm for more reliable and efficient power delivery. It requires monitoring, controlling, and managing the power grid in...

How Is Hospital Critical Infrastructure Protected?

Hospitals hold a lot of sensitive data. When they are hacked, patient information is exposed, putting patients at risk because the hackers can use...

Software Engineering for Cyber-Physical Systems

Cyber-physical systems (CPS) are engineered systems that integrate computation, networking, and physical process. CPS classifies in many ways, including their scale, embeddedness, and the...