Web application penetration testing with ImmuniWeb
Switzerland-based ethical hacking and penetration testing experts High-Tech Bridge recently released an interesting security product that uses a hybrid approach towards web …
Secure public WiFi with avast! SecureLine for iOS
While constant Internet connectivity can be useful, it does create many privacy and security issues whose existence remains a mystery for the majority of mobile users. If you …
Thecus N5550 NAS Server inside and out
Having a backup drive has become essential. Those serious about their storage needs turn to NAS devices. Like most tech available today, those range from introductory models …
Professional Penetration Testing, Second Edition
Are you interested in a career in penetration testing, and don't know where to start? Here is a book that gathers all the relevant information in one place, and gives a good …
Network Security Through Data Analysis
One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the …
Working with the Toshiba FlashAir II wireless SD card
With storage prices declining and the popularity of SD cards increasing, some computer makers are incorporating SD card readers into their machines. I find myself using them …
Thinking with Data: How to Turn Information into Insights
With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover …
Two-factor authentication for WordPress using Rublon
Rublon provides automatic two factor authentication for web applications. It currently supports Drupal, WordPress, Magento, PrestaShop and OpenCart. Two-factor authentication …
Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001
A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the …
Investigating Internet Crimes
Cybercrime is exploding, we all know that. But if you ever wondered about how online crimes are investigated by law enforcement, wonder no more: this guide book goes through …
Social Media Security
I remember the days when social media was used exclusively by early adopters and technology buffs. Today, it's a firm part of our daily lives. Individuals use it to network …
Featured news
Sponsored
Don't miss
- Most people still rely on memory or pen and paper for password management
- What AI can tell organizations about their M&A risk
- Breaking down the numbers: Cybersecurity funding activity recap
- Applying DevSecOps principles to machine learning workloads
- Overcoming GenAI challenges in healthcare cybersecurity