Ransomware is a type of malware that encrypts a victim's files. The attackers then demand a ransom from the victim to...
Gulf Countries and Data Security Breaches
It is a no brainer to mention that cyber crime is increasing and today, the focus is more on money & cyber war...
Cloud Security Report–Spring 2014
The Cloud Security Report Spring 2014 edition from Alert Logic is available for public download. This report is based...
Whitelisting in Java
Java vulnerabilities and zero day exploits are very common these days. It has take to the extend that security experts...
Encryption and Security, think again
NSA is accused to be spying on the people for years. In a recent article, NewYork Times describes the strategies by...
WireShark Tutorial
Wireshark is a one among the top sniffing tools used by any network / security analysts. Here are to great videos on...
Privileged account management solutions
Privileged accounts like System Administrators and Network Administrators have elevated privileges in a system....
NMAP Tutorials–Video
Most of us use nmap as a tool for performing security assessments. NMAP helps us in many ways. When we built a team...
Enterprise Information Security
Enterprise Information Security is receiving a lot of attention these days. Especially with the wide reach of media...
Advanced Persistent Threats – Detection
When an attacker targets someone or some organization (target) to obtain or change information using ways that are...
CSA releases SecaaS Implementation Guidance for Identity and Access Management
In the recent past CSA has defined the categories of security services that can be offered as Security as a Service....
Cloud Security Alliance Guidance on Security as a Service (SecaaS)
The CSA (Cloud Security Alliance) has issued a new guideance with a focus on how security can be provided as a service...
List of Disk wipe software
People and organizations dispose of their computers including the Hard drives when no more needed or considering that...
Cloud Computing = Low cost? Check again.
It is been considered that the cloud computing solutions reduces the cost of computing resources as far as...
Malware attack at Saudi Aramco
In the recent past, Middle Eastern companies are becoming a frequent target of attackers. Malware attack at the Saudi...
Cloud Computing and Enterprise risk management
The number of organizations adopting clouding computing increases day by day. The COSO has published a thought paper...
Backtrack 5 R3 is available for download
Backtrack developers had released a new version of the backtrack penetration testing live CD / VMware version...
NIST Computer Security Incident Handling Guide
NIST has published the final version of their guide on Computer Security Incident Handling. This guide is built based...
Flame. the 3rd known cyber weapon grade malware
Kaspersky Labs announced its new finding on the cyber warfare space, FLAME, indicating that the cyberwar landscape is...
Free Firewall from Checkpoint
Checkpoint is getting into the Free Antivirus game by offering its ZoneAlarm antivirus software as a free consumer...