How Hackers Get Your Password
Passwords are often the weakest part of an organisation’s or individual’s security. Often passwords are easy to guess, reused, or stored improperly, meaning a hacker with enough skill can gain access to
Passwords are often the weakest part of an organisation’s or individual’s security. Often passwords are easy to guess, reused, or stored improperly, meaning a hacker with enough skill can gain access to
In this article we will outline what is meant by physical security in the context of cyber security. We will have a look at the top ten best practices for securing your environment physically. Most of these you may think are common sense. However, you really would be amazed to discover how many reputable
Regular penetration testing is becoming increasingly important. What many business owners seem to want to know, however, is when to arrange a system test. Any application that processes personal data, whether in the storing or retrieving personal data, needs to have its security tested regularly according to GDPR Article 32 (1.D). Many systems have never … Read more
GDPR gives the control of personal data back to the person it belongs to. This, in turn, ensures a safeguard for peoples’ privacy as a basic human right. It is important for companies to be aware of and adhere to as there are tough financial penalties for non-compliance.
If the name doesn’t already sound strange enough, wait until you see what you can do with Google Dorking. Before we dive deep into how we can use Google Dorking. We must first look at search engines themselves. What is a search engine? A search engine can be thought of as a behemothic database, however, … Read more
OSINT or Open-source Intelligence is a process of data collection using sources that are open to the public. This can be a wide range of origins – anything from large blogs to specific images and the metadata contained within. Everything posted online discloses some information about the poster and this is what OSINT is looking … Read more
Web application penetration testing describes the process of simulating an unobtrusive attack against a web application. It allows companies to understand vulnerabilities that are easy to miss during the development process. These vulnerabilities can have wide-reaching consequences to the application as well as the data stored within its database.
Penetration testing comes in many forms and is often dependent on the type of application/ system being tested. This often falls into four categories. API penetration test, mobile penetration test/application penetration test, infrastructure penetration test, and web application penetration test. Each one of these types of tests has different steps and techniques. API Penetration Testing: … Read more
Pegasus Project is now one of the biggest scandals, with tens of thousands of government officials and journalists being hacked and surveilled by their own governments, and other countries using malware and spyware developed by NSO group; a ‘Cyber Intelligence’ company based in Israel.
Public, Powerful and Free. The Hacker’s Arsenal. While it is true that some elite hacking tools are passed in the shadows, most of these business-breaking programs are available on the public internet and have thousands of developers. For any aspiring hacker, these applications allow them to complete tasks in seconds which, 5 years ago, would … Read more