Kentico How To: Custom Filter Control In CMSDesk Listing Mode
In a recent Kentico project I was asked for some custom filtering options to the CMSDesk listing page of specific document types, allowing users to filter the documents based on specific fields of the...
View ArticleGetting Started With Memory Forensics
Memory forensics/analysis is an interesting playground in the security and digital forensics investigation area, it consists of acquiring and analyzing the image of a volatile running computer memory....
View ArticleIncreased Phishing Threats with Obfuscation
We’ve talked about being a phishing victim before and how to protect ourselves, yet as everything evolves and mutate, new techniques are always implemented, and used to increase the probability of...
View ArticleTaking Advantage of Google’s Services to Obfuscate Spammers Phishy URL’s
Obfuscating phishy and “shady” URLs, as Warner called them in his Blog post, is nothing new. We’ve been witnessing various mutated techniques from spammers attempting to obfuscate their real intentions...
View ArticleAcceptance of Friendly-Good Computer Worms Security Architectures- Survey
Hello fellow academics, colleagues and specialists, As a part of my MSc in Computer Security at the University of Liverpool, I am researching the applicability and acceptance level of the...
View ArticleVulnerable LastPass – Vault Cracked
Memorizing an N number of passwords (N representing your different passwords) proved to be a burden and hectic task to achieve. This fact is one of the biggest reasons behind the fact that many of us...
View ArticleTracked by Chrome Extensions
So what’s going on? briefly, if you use Google Chrome as your main browser and extend its functionality with some of its many available extensions then you might be susceptible to behavioral tracking....
View ArticleBeware from Social Engineering Two-Factor Authentication
Various tech giants data breaches were reported lately, with millions of accounts passwords and information being leaked (ex: Twitter, LinkedIn, Email Service Giants, etc…) as if this is not bad news...
View ArticleCellular Networks SS7 Design Flaws Exploited to Hack Facebook Logins
The Short Story In short, your Facebook account, and most probably other accounts (Google, Twitter, etc…) can be hacked, no matter how strong and complex your password is. As if social engineering 2FA...
View ArticleThe Power of Social Engineering
In this Youtube video you will see how a skilled hacker can exploit our social vulnerabilities and tap into our human system to reveal sensitive information and infiltrate our digital life. Tagged:...
View Article
More Pages to Explore .....