Security

Covid Pandemic Guest Post IoT Security

Considering Multiple Angles of Cybersecurity in Product Development

The following is a guest post Today, cybersecurity plays a key role in software engineering and development. To understand why, consider the impact of the coronavirus (COVID-19) pandemic. The COVID-19 crisis has created a “cyber pandemic.” A study conducted by the Center of Internet Security (CIS) revealed 26% of security and IT leaders reported an […]

Read More
Security

How can Hackers STILL Break Your Passwords?

In this video we touch upon the problems with just Hashing your passwords, and how they can still be vulnerable, along with some potential solutions.

Read More
Python Security

Ethical Hacking: Injecting Code into Notepad with Python

In this video watch how to inject your own python code as well as a python interpreter into Notepad.exe and even injecting code into Command Prompt.

Read More
Security

Cyber Security Course – Learn Cyber Security In 12 Hours

Below are the topics covered in this Cyber Security full course video: Introduction to Cybersecurity Top Cyber Security Skills Types of Cyberattacks What is Cyber Security Ethical Hacking Cryptography CompTIA Security+Cerificatios CEH Certification CISSP Certification Cyber Security Interview Questions and answers

Read More
NodeJS Security

NPM Packages are Getting Hacked

Npm packages are getting hacked. and attackers are attempting more and more. Recently UA-Parser.js was attached and scripts were installed on compromised systems to extract browser stored passwords and do crypto mining. Understanding such attacks will help you to safeguard yourself from such incidents in the future.

Read More
Security

Malware Uses Ancient Encryption to Avoid Detection

Everything old is new again. Time stamps: 0:00 The Raids 0:44 The Lure 1:38 Mekotio’s Features 3:32 Obfuscation 4:16 Super Cool BadUSBs

Read More
AWS Security

AWS Cryptographic Computing

AWS Cryptography tools and services utilize a wide range of encryption and storage technologies that can help customers protect their data at rest and in transit. To address this need, AWS is developing new techniques for cryptographic computing, an emerging technology that allows computations to be performed on encrypted data, so that sensitive data is […]

Read More