| by Zeljka Zorz - Tuesday, 26 January 2016.
You can discover a lot - too much, some believe - by digging through publicly available data. But, how to go about it, how to make the search as easy and quick as possible, and what are the things you have to be careful about? This book will tell you.
| by Zeljka Zorz - Tuesday, 19 January 2016.
The Internet can be a great source of information, and Google Search can help you find what you're looking for. Knowing how to "hack" Google Search and the company's services to unearth helpful information for executing cyber attacks and intrusions is a great skill for both hackers and penetration testers to have.
| by Zeljka Zorz - Tuesday, 27 October 2015.
| by Berislav Kucan - Wednesday, 21 October 2015.
Netwrix Auditor is a powerful change and configuration auditing platform that leverages the data collected from all parts of the company network to provide detailed information on everything that is going on inside.
| by Zeljka Zorz - Tuesday, 13 October 2015.
Whether you like it or not, the Internet of Things is happening. As the author himself noted in a recent interview, some - arguably, too many - people think they don't have to worry about the security implication of IoT because they believe that living in a traditional world of disconnected devices will continue to be an option. That particular future looks increasingly unlikely, and this is why we simply must start seriously addressing the problem. This book paints a clear picture of the current situation, and what we can learn from it in order to create a safer future for all of us.
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.