Quantcast
Channel: Salim Awad – SalSoft
Browsing latest articles
Browse All 22 View Live

Image may be NSFW.
Clik here to view.

Kentico How To: Custom Filter Control In CMSDesk Listing Mode

In a recent Kentico project I was asked for some custom filtering options to the CMSDesk listing page of specific document types, allowing users to filter the documents based on specific fields of the...

View Article



Image may be NSFW.
Clik here to view.

Getting Started With Memory Forensics

Memory forensics/analysis is an interesting playground in the security and digital forensics investigation area, it consists of acquiring and analyzing the image of a volatile running computer memory....

View Article

Image may be NSFW.
Clik here to view.

Increased Phishing Threats with Obfuscation

We’ve talked about being a phishing victim before and how to protect ourselves, yet as everything evolves and mutate, new techniques are always implemented, and used to increase the probability of...

View Article

Image may be NSFW.
Clik here to view.

Taking Advantage of Google’s Services to Obfuscate Spammers Phishy URL’s

Obfuscating phishy and “shady” URLs, as Warner called them in his Blog post, is nothing new. We’ve been witnessing various mutated techniques from spammers attempting to obfuscate their real intentions...

View Article

Image may be NSFW.
Clik here to view.

Acceptance of Friendly-Good Computer Worms Security Architectures- Survey

Hello fellow academics, colleagues and specialists, As a part of my MSc in Computer Security at the University of Liverpool, I am researching the applicability and acceptance level of the...

View Article


Image may be NSFW.
Clik here to view.

Vulnerable LastPass – Vault Cracked

Memorizing an N number of passwords (N representing your different passwords) proved to be a burden and hectic task to achieve. This fact is one of the biggest reasons behind the fact that many of us...

View Article

Image may be NSFW.
Clik here to view.

Tracked by Chrome Extensions

So what’s going on? briefly, if you use Google Chrome as your main browser and extend its functionality with some of its many available extensions then you might be susceptible to behavioral tracking....

View Article

Image may be NSFW.
Clik here to view.

Beware from Social Engineering Two-Factor Authentication

Various tech giants data breaches were reported lately, with millions of accounts passwords and information being leaked (ex: Twitter, LinkedIn, Email Service Giants, etc…) as if this is not bad news...

View Article


Image may be NSFW.
Clik here to view.

Cellular Networks SS7 Design Flaws Exploited to Hack Facebook Logins

The Short Story In short, your Facebook account, and most probably other accounts (Google, Twitter, etc…) can be hacked, no matter how strong and complex your password is. As if social engineering 2FA...

View Article


Image may be NSFW.
Clik here to view.

The Power of Social Engineering

In this Youtube video you will see how a skilled hacker can exploit our social vulnerabilities and tap into our human system to reveal sensitive information and infiltrate our digital life. Tagged:...

View Article
Browsing latest articles
Browse All 22 View Live




Latest Images