How To Use Cloud Computing
The Cloud is meant to be user friendly and not at all complex, but some people are still confused about the Cloud. In the...
Mitigating Inherent Security Risks Of Software Of Unknown Pedigree (SOUP)
Assuming that third-party suppliers are taking sufficient security precautions is a risky assumption. In actuality, the majority of externally developed software applications fail to...
Security Awareness Training: Why Every Business Needs It
The need for security awareness training is more important than ever. Every company that plans to stay competitive must make this type of training...
The 6-Strikes Rule is Coming: Will it Impact You?
The commonly called "six-strikes rule" has been batted around since 2011. The fairly new Center for Copyright Information is the driving force behind this...
IT Disaster Recovery Top Trends
The natural calamities do often cause losses in many ways including ruining the infrastructure of any business organization and huge data loss. Hence you...
Spoofing and Spear Phishing | Traditional Solutions are Not Enough
Receiving spoofed emails is a nuisance,
irritating and inconvenient, but generally spoofed emails are easy to identify and recipients delete
these emails – making...
SP Toolkit – spt Phishing Toolkit
The basic idea we (the spt project) had was that wouldn’t it be cool
if there were a simple, effective, easy to use and...
Ghost Phisher – Phishing & Penetration Attacks
Ghost Phisher is a computer security application that comes inbuilt with
a Fake DNS Server, Fake DHCP Server, Fake HTTP server and also has...
Result & Solution of Image Cracking Challenge
There was a challenge has been
published on the blog to find the secret message(s) hidden on the
images, the challenge contain...
CrystalAEP – Anti-Exploit Protection Tool
CrystalAEP is designed to provide frontline protection against Internet-borne threats such as viruses and malware. Unlike the typical anti-virus program, Crystal does not attempt...
Most Read
What Makes ICS/OT Infrastructure Vulnerable?
Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...
Everything You Must Know About IT/OT Convergence
What is an Operational Technology (OT)?
Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...
Understand the OT Security and Its Importance
This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...
What is Deepfake, and how does it Affect Cybersecurity?
Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...