Hacking VoIP: Protocols, Attacks, and Countermeasures
VoIP has given us an affordable alternative to telecommunications providers that were charging us a small fortune for telephone calls, especially those made to international …
IPv6 Security
With the online world rapidly expanding, we are moving towards the IPv6 protocol. With this migration it becomes essential for networking professionals to gain insight into …
Is It Safe? Protecting Your Computer, Your Business, and Yourself Online
With the evolving world of the Internet, malicious activities are elevating rapidly. Majority of the attacks are targeting novice users, those who are not educated about the …
Making Things Happen: Mastering Project Management
It doesn't matter if you just got that promotion and you're supposed to oversee a project or if you're a one man band working on something, "Making Things Happen" is …
Web Security Testing Cookbook
Buying furniture on eBay, selling childhood ZX Spectrum cassette tapes, doing online banking - every service we use is powered by a robust web application. With all the …
iPhone security software – SplashKey
SplashKey is a password generator for the iPhone. This freeware comes from SplashData, a company well known in the world of mobile applications. Their software products have …
Voice over IP Security
With VoIP becoming practically a household name and present in organizations worldwide, we are witnessing a natural increase in attacks and other problems. With this title, …
Security Power Tools
By reading through security web sites, traversing through software depositories and using Google, you can keep your self updated with the latest tools and attack/defense …
Network Warrior
The Cisco CCNA network associate certification validates the ability to install, configure, operate, and troubleshoot medium-size routed and switched networks, including …
Google Apps Hacks
Practically everyone on the Internet uses Google for one of its many services. Once a search engine only, today offers a variety of online tools and software titles that …
Crimeware: Understanding New Attacks and Defenses
Even as the security industry celebrates solid sales thanks to compliance laws, the last few years have not been characterized by a state of growing security. In fact, …
Featured news
Resources
Don't miss
- Google patches actively exploited Chrome (CVE‑2025‑6554)
- Federal Reserve System CISO on aligning cyber risk management with transparency, trust
- How cybercriminals are weaponizing AI and what CISOs should do about it
- How analyzing 700,000 security incidents helped our understanding of Living Off the Land tactics
- CitrixBleed 2 might be actively exploited (CVE-2025-5777)