Security

Microsoft Security

Microsoft Security: Breaking the Rules – Stories from Employees

Retired MSFT developer Dave details the age old battle between corporate security policies and recalcitrant users at Microsoft and IBM.

Read More
Security

SQL Injection Attack Tutorial – Cybersecurity Training

This video will give you an exhaustive on the fundamentals of SQL Injection and teach you how to use SQL Injection to hack a Web Application and also how to prevent it. Like Little Bobby Tables’ Mom says, “Always sanitize your inputs.”

Read More
Current Events Security

How Cyberwarfare Actually Works

With the war in Ukraine continuing into a likely stalemate, the chances of an all out Cyber War increase as Russian forces seek to gain an edge in any way they can. Unfortunately, in a cyberwar the front lines are as close to you as your phone is. But how would a cyberwar actually play […]

Read More
Developer Security

Coding For Cybersecurity

This Edureka video on “Coding for Cybersecurity” will help you understand and learn the fundamentals of Cyber Security. This Cyber Security Tutorial is ideal for beginners who want to get insights into how programing and coding can help you in your quest for a career in Cybersecurity. We will also see how to build a […]

Read More
Security

Exactly What is an IP Address?

Did you ever wonder what exactly an IP address is, what it means, and how to properly subnet? Well then, NetworkChuck has the course for you!

Read More
Red Hat Security

Ask an OpenShift Admin: Closed Loop Cloud-Native Security

Red Hat OpenShift has a lot of moving pieces, and sometimes it may seem like too much to remember. Maybe you have a config problem that no amount of search engine kung-fu can solve? Or that you don’t know where to get started with learning and applying these tools to your day-to-day work? That’s where […]

Read More
IoT Security

Smart Meters are Vulnerable to this Attack

Everyone wants to connect everything up to the internet, but they do not realize that the connection runs in both directions. Voltage glitching attacks have been documented for quite some time, now I am going to apply these well known techniques to extract the smart meters firmware for analysis.

Read More