Friday, March 17, 2017
Posted by manager
Reader's rate:
0
Contributed by Manish Tanwar SQL Injection AKA mother of hacking is one of the notorious and well known vulnerability which has caused lots of damage to cyber world. Researchers has published lots of stuff on different-2 exploitation techniques for conducting various type of attacks including... + continue reading
Thursday, March 2, 2017
Posted by manager
Reader's rate:
0
Contributed by Michael Mozingo Millions of credit and debit card transactions are completed daily. Credit and debit card usage is steadily increasing, and with it, so is the treat of fraud. With the increase of payment card fraud, it is important for the merchants who accept these types of... + continue reading
Tuesday, February 28, 2017
Posted by manager
Reader's rate:
0
Contributed by Wendell Collie Jr. This paper's purpose is to investigate best practices for firewall configuration and maintenance in higher education. It seeks to aid these learning institutions by providing an in-depth analysis of firewalls. In particular, this study will have compared various... + continue reading
Monday, February 6, 2017
Posted by manager
Reader's rate:
5
Contributed by Anthony Ralston This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper will define and look at the different angles that phishes can exploit users and how we can measure... + continue reading
Monday, February 6, 2017
Posted by manager
Reader's rate:
5
Written by Scott N. Schober Hacked Again is a book about an introduction to information security and key terms or phrases used in the industry. Each chapter covers a different aspect of Information Security which includes a definition and a few examples to clarify. Scott, the author, clearly... + continue reading

Home Page

Featured Articles

Friday, 17/03/17 - 0 comment(s)
Contributed by Manish Tanwar SQL Injection AKA mother of hacking is one of the notorious and well known vulnerability which has caused lots of damage to cyber world. Researchers has published lots of stuff on different-2 exploitation techniques for conducting various type of attacks including accessing data stored in database, reading/writing... + continue reading
Tuesday, 28/02/17 - 0 comment(s)
Contributed by Wendell Collie Jr. This paper's purpose is to investigate best practices for firewall configuration and maintenance in higher education. It seeks to aid these learning institutions by providing an in-depth analysis of firewalls. In particular, this study will have compared various types of firewall technologies along with its... + continue reading

Red Tape

Thursday, 02/03/17 - 0 comment(s)
Contributed by Michael Mozingo Millions of credit and debit card transactions are completed daily. Credit and debit card usage is steadily increasing, and with it, so is the treat of fraud. With... + continue reading

Cryptography

Monday, 22/08/16 - 0 comment(s)
Contributed by Aelphaeis Mangarae Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual. Steganography is often... + continue reading

Exploitation

Tuesday, 28/02/17 - 0 comment(s)
Contributed by Aelphaeis Mangarae a.k.a. Chris Morganti XSS attacks are becoming a big problem and are going to become an extremely big problem if people do not educate themselves about XSS... + continue reading

Et Cetera

Monday, 06/02/17 - 1 comment(s)
Contributed by Anthony Ralston This paper will focus on understanding the risk associated with phishing attacks on companies and how we can measure growth through phish benchmarking. The paper... + continue reading

Recommended Reading

Monday, 06/02/17 - 0 comment(s)
Written by Scott N. Schober Hacked Again is a book about an introduction to information security and key terms or phrases used in the industry. Each chapter covers a different aspect of... + continue reading