Please turn on your JavaScript for this page to function normally.
A primer on breaking game console security

Are you interested to learn about the delicate hacks and tricks that go on behind the curtains of the scene better known as the console hacking scene? In this podcast recorded …

ISO 27001 standard benefits, implementation tips and security controls

Dejan Kosutic is an expert in information security management and business continuity management. In this interview he talks about the key changes in the ISO 27001: 2013 …

iPhone secure messaging with self-destruct mechanism via Wickr app

Wickr was one of the most interesting companies I was introduced to at this year’s RSA Conference in San Francisco. The company was one of the finalists of the …

The IT road to hell

The past several months have been an unending nightmare for the US government and its allies, as one disclosure after another has caused unimaginable damage to relationships, …

How meaningful are AV tests?

Anti-malware software from vendors big and small is regularly tested by several antivirus test labs, which may result in awards and certification, but also in disappointment. …

How to sniff local network traffic on an unrooted Android device

Google Play hosts a number of applications that focus on local network traffic sniffing for Android devices, but for the majority of them you would first need to root the …

Plan to fail for better security

We’ve all heard the old saying: “If you fail to plan, you’re planning to fail.” Of course, it’s true: and from a security viewpoint, it’s …

Customizing defense models to reduce the window of exposure

Most organizations already have a defense model in place that is meant to protect them from attacks, but the problem is that many use an outdated one. But the threat landscape …

Python for web application security professionals

Python is an open source, interactive, object oriented programming language. It’s very easy to learn and an extremely powerful high level language. It runs on Windows, …

Solving the dilemma of vulnerability exploitation disclosure

The subject of software and hardware vulnerability disclosure has been debate time and time again, and most agree that, if possible, vulnerabilities should first be disclosed …

WordPress security threats, protection tips and tricks

Robert Abela is a WordPress Security Professional and founder of WP White Security. In this interview he talks about the main WordPress security risks, offers tips for website …

Analyzing APK files inside an online Android application sandbox

Anubis is an online project developed by International Secure Systems Lab, which focuses on analyzing of binaries for different type of systems. The online sandbox was first …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools