Security

Linux Security

Linux Essentials for Ethical Hackers – Full InfoSec Course

In this Linux course, you will learn the 20% you need to know to be efficient with Linux. This course will teach all the common Linux skills used in cyber-security and ethical hacking. HackerSploit developed this course. Course Contents: (0:00:00) Introduction (0:01:56) Useful keyboard Shortcuts (0:08:52) File Management & Manipulation (0:32:18) File & Directory Permissions […]

Read More
Linux Security

Linux and The Tragedy of the Commons

In a recent blog post, Google security researcher Kees Cook said that the Linux kernel and its toolchains are currently underinvested by at least 100 engineers. Worse still, many vendors are acting only from self interest that will ultimately lead Linux into the Tragedy of the Commons. What does this mean for consumers, enterprises, and […]

Read More
Privacy Security

How to Make Your Own VPN

Watch this video on Wolfgang’s Channel about how and why to make your own VPN.

Read More
Hardware Security

Remote Zero Trust device management with Microsoft Surface

With firmware attacks up five-fold in the last four years, pushing Zero Trust to endpoints is a growing concern for security managers. Who makes the only PCs that give security managers zero-touch cloud-control of firmware? Microsoft. And they are beautiful – have you seen the Microsoft Surface Laptop 4 in Matte Black metal? Related links: […]

Read More
Azure DevOps Security

DevSecOps: bringing security into your DevOps practice on Azure

Victoria Almazova joins David Blank-Edelman to discuss DevSecOps practices on Azure – what it is, why it’s so important, and how you can implement DevSecOps processes for your team.       Resources: Well-Architected Framework Security pillar ​ Azure Well-Architected Review ​ Secure DevOps DevSecOps in Azure​ Secure DevOps Kit for Azure ​ Secure Azure pipelines

Read More
Security

Why Did He Hack His Own Car?

Steve Mould hacked his own car to demonstrate how vulnerable we are.

Read More
Privacy

Reliable Email Providers More Private than Gmail

Strong user privacy controls in Gmail are not a priority for Google. There are reliable free and paid email providers offering security and privacy with strong encryption and anonymous usage. censiCLICK highlights the most prominent ones.

Read More
Data Security

Basics of SQL Injection – Penetration Testing for Ethical Hackers

In case you’re wondering why I am posting a lot of security related content today, the reason is simple: it impacts everyone. If you’re a data engineer and think that you are immune to security concerns, think again. SQL injection is a common hacking technique used to retrieve or destroy data from a database without […]

Read More