Surviving a Ransomware Attack
As per Google, it’s estimated that last year cybercrime victims paid out around $24 million to hackers deploying ransomware and it has incre
Hacking vs Penetration Testing and Hackers vs Ethical Hackers
We hear the word hacking all the time but ethical hacking, penetration testing or pen testing not so much. I have had business owners...
Hackers do not come with a badge
I have come to learn in the IT security market that we now live in a world where certificates and badges seem to matter the most when...
Should you always trust that browser padlock?
Originally published on Hakin9 Magazine We’ve always been taught that you are safe if your browser is displaying a little padlock. But is...
The Rise and Warfare of Ransomware
Originally published on Cyber Defense Magazine August 2016 What is Ransomware? Ransomware is compiled of two words which is Ransom and...
Is Social Engineering the easy way in?
Originally published for BCS: http://www.bcs.org/content/conWebDoc/56216 Social engineering techniques have been used by con artists for...
Vulnerability Assessment vs. Penetration (Pen) Test
There is often confusion surrounding vulnerability scanning/assessment vs. Pen testing that causes organisations to waste resources or...
Cybersecurity
(Source: kaltoons.com) Why we need Cybersecurity? With the rapid expansion of the internet over the last few decades and the technology...