In its latest Patch Tuesday releases, Microsoft pushed patches to fix about 20+ vulnerabilities in various MS products...
Another set of Celeb Leaks
After Jennifer Lawrence it is now time to see what hackers have about Kim Kardashian. Private photographs of Kim...
Google Hacking – FBI warns public
Google Dorking, Also known as “Google hacking,” involves using specialized search parameters to locate very specific...
OWASP AppSec Tutorial Series
Here is a list of videos published in YouTube about application security. It is a great compilation of video and a...
Identity Protection Services
Identity theft is on the increase. Everyday we hear stories about identity theft by hackers and millions of identifies...
WireShark Tutorial
Wireshark is a one among the top sniffing tools used by any network / security analysts. Here are to great videos on...
Enterprise Information Security
Enterprise Information Security is receiving a lot of attention these days. Especially with the wide reach of media...
CSA releases SecaaS Implementation Guidance for Identity and Access Management
In the recent past CSA has defined the categories of security services that can be offered as Security as a Service....
Cloud Security Alliance Guidance on Security as a Service (SecaaS)
The CSA (Cloud Security Alliance) has issued a new guideance with a focus on how security can be provided as a service...
Critical Infrastructure system security in India
The recent power outage in the northern parts of India was part of a grid failure. However, it could have been a...
Online degree in Information Security courses
The field of Information Security is the study of countermeasures to the threat of information infrastructure failure...
2012 Data Breach Investigations Report
Verizon has published its 2012 data breach investigations report. This years report is a result of analysing 855...
Developing a Security awareness strategy
Further to the earlier articles related to Information Security Awareness, I found this video is bit interesting for...
Microsoft RDP Vulnerability Exploit
A proof of concept / working exploit for the recent RDP vulnerability is published in YouTube. Try the exploits codes...
Microsoft RDP to be patched
The recently announced Microsoft RDP is hitting the headlines again as there are working exploits being developed and...
nCircle Announces Patch Priority Index.
Last week lots of security patches were released by various vendors, especially Microsoft. It is always challenging...
Google data center security
Found this interesting video in Youtube. It talks about the Google efforts on enforcing security across its data...
How to use Havij for SQL injection attack testing
Havij is an interesting tool for performing advanced SQL injection attacks. This should be part of the penetration...
Physical & Information Security Awareness
A good cartoon on the physical security aspects of information security from Mindful security. It could be part of the...
The Anatomy of an Anonymous Attack
iMPERVA has recently released a report on the attack patters followed by the Anonymous group. The report gives...