• Network Security Through Data Analysis

    | by Zeljka Zorz - Thursday, 3 April 2014.

    One of the most crucial tasks of a network administrator is to keep the network secure - or as secure as possible. In order to do this, they must know of which components the network is made and how these components are used. In short, they have to have an accurate picture of the situation. This book explains how to reach that goal.

  • Working with the Toshiba FlashAir II wireless SD card

    | by Mirko Zorz - Monday, 24 March 2014.

    With storage prices declining and the popularity of SD cards increasing, some computer makers are incorporating SD card readers into their machines. I find myself using them even more than USB thumb drives because of their small size and the fact that they fit into all my cameras, which makes it easy to carry files and photos around at all times.

    What makes this Toshiba SD card stand out from the rest of what's in your drawer? It comes with a wireless connection. You can share your videos and photos with seven devices at the same time: PCs, Macs, smartphones and tablets, without the need for an Internet connection.

  • Thinking with Data: How to Turn Information into Insights

    | by Zeljka Zorz - Wednesday, 19 March 2014.

    With the advent of computer systems and the Internet, data has become plentiful and easily accessible. The problem now is to separate the wheat from the chaff, and discover what of it is useful. This book explains how.

  • Two-factor authentication for WordPress using Rublon

    | by Berislav Kucan - Friday, 28 February 2014.

    Rublon provides automatic two factor authentication for web applications. It currently supports Drupal, WordPress, Magento, PrestaShop and OpenCart. Two-factor authentication is definitely something that all web based applications should enforce, so using Rublon or some similar plugin is a good way to ramp up your security.

  • Cloud Essentials: CompTIA Authorized Courseware for Exam CLO-001

    | by Zeljka Zorz - Friday, 21 February 2014.

    A part of the popular Sybex Essentials series, this book tackles the basics of cloud computing, the pros and cons of public, private and hybrid clouds, talks about the different service models, strategies on cloud adoption, and touches on cloud security, privacy and compliance.


The synergy of hackers and tools at the Black Hat Arsenal

Posted on 27 August 2014.  |  Tucked away from the glamour of the vendor booths and the large presentation rooms filled with rockstar sessions, was the Arsenal - a place where developers were able to present their security tools and grow their community.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.


Thu, Aug 28th