Practical Introduction to Malware Analysis

Learn malware analysis fundamentals from the primary author of SANS’ course FOR610: Reverse-Engineering Malware (REM). In this session, Lenny Zeltser will introduce you to the process of reverse-engineering malicious software. He will outline behavioral and code analysis phases, to make this topic accessible even to individuals with a limited exposure to programming concepts. You’ll learn […Read More]

Try Experimental Malwarebytes Extension for Firefox

There has not been much information released on this Firefox extension by Malwarebytes Inc. apart what’s been listed on extension page and in this forum post. Essentially extension detects and protects against malware, scams, and deceptive advertising on the web. The extension is brand new and labeled as experimental. Malwarebytes did not release a Chrome […Read More]

Check Who Has Access to your Google Drive Files

If you would like to know which files and folders in your Google Drive are shared with other users and what kind of access permissions are in place then Google Drive Permissions Auditor is the right tool for you. Google Drive Permissions Auditor creates a detailed privacy report of shared permissions and access settings of all […Read More]

Operating Systems for Penetration Testing & Digital Forensics

Penetration testing is the activity of testing a software by trained security experts in order to find out its security vulnerabilities. There are thousands of standalone tools for penetration testing and forensic investigation, if you are practicing penetration testing and ethical hacking, then you will love the following Linux-based operating systems. Kali Linux Kali Linux […Read More]

Hidden Keylogger Found on HP Laptops

Hidden software that can record every letter typed on a computer keyboard has been discovered pre-installed on hundreds of HP laptop models. Security researcher Michael Myng found HP had a keylogger in the keyboard driver. The keylogger saved scan codes to a WPP trace. The logging was disabled by default but could be enabled by […Read More]

Windows Data Loss Prevention for Small Business

Data loss prevention solutions can be very costly to implement and cost is often the first hurdle in determining whether or not a small business implements a data loss prevention plan. This video is designed to showcase that it is possible to design solid data loss prevention plan without investing a lot of money. This […Read More]

Top Free VPN Services

In this day and age, it is very important to use a good VPN (Virtual private network) to hide your IP address from the outside world. A Virtual Private Networks (VPN) allows you to communicate private information securely over a public network. Usually large corporations, educational institutions and government agencies use VPN technology to enable […Read More]

Information Gathering Using Windows Command-Line

Ethical hackers or pen testers, use several tools and techniques to collect important information about the target systems. Windows offers several command line utilities that are helpful for information gathering. To gain better understanding of the machine, what it does, what it is connected to, what level of privilege we have or what operating system […Read More]

Best Free Data Destruction Software

Simply reformatting a disk or reinstalling the operating system does not guarantee the old data is unreadable. In this article, we’ve listed best free data destruction software that you should consider next time you are getting rid of your old computer drives consider using the following free data destruction software. DBAN Darik’s Boot and Nuke, […Read More]

Better way to manage Windows Firewall

Windows built-in firewall is not so intuitive to configure and manage, which is why most of the time will just leave users intimidated to touch the default settings. Windows Firewall Control is a powerful tool which extends the functionality of Windows Firewall and provides new extra features which makes Windows Firewall even better, easier to use […Read More]

Blockchain Technology Explained

Blockchain technology is a relatively new concept and can be a confusing concept to understand. Here in this article we will try to simplify things by first explaining what is a blockchain. A Blockchain is a distributed database or ledger that multiple parties share and everyone can trust. A Blockchain network provides a mutually trusted, […Read More]

The new Linux-based OS aims for security with usability

Subgraph OS is an “adversary resistant computing platform.” It’s similar to Tails in that it’s based on Debian Linux and all traffic is forced through Tor. Subgraph OS is a relatively lightweight and is based on a foundation designed to be resistant to attacks against operating systems and the applications they run. The OS comes with […Read More]

Analytics Made Easy - StatCounter
scroll to top