Video: Blockchain Hacking for Investigating Cryptocurrencies

Video and Slide Deck from EH-Net Live! Oct 2018
Follow the money. Be it business, politics or crime, this is a common method of trying to find out who’s involved and their motivations. In the world of cyber crime, bad actors use cryptocurrencies for th… Continue reading Video: Blockchain Hacking for Investigating Cryptocurrencies

Latest security tests introduce attack chain scoring

When is a security
breach serious, less serious or not a breach at all?
Latest reports now online.
Our endpoint
protection tests have always included targeted attacks.
These allow us to gauge
how effectively anti-malware products, in use by millions of… Continue reading Latest security tests introduce attack chain scoring

The Evaluation: Stage 1 – Definition of the Problem to be Solved

I need a better pen.
That statement may mean something dramatically different depending on who just said the words. In some cases, like with me, it means I want more consistent ink and a body that fits comfortably in my hand for longer periods of time…. Continue reading The Evaluation: Stage 1 – Definition of the Problem to be Solved

Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018

Register Now to Learn Blockchain Hacking Step-by-Step!
Nick Furneaux, forensics trainer, investigator & author of “Investigating Cryptocurrencies” takes you through a journey of code and tools to unpick the movement of illegal funds through the blo… Continue reading Webinar: Blockchain Hacking for Investigating Cryptocurrencies on Oct 24 2018

CLEAR, Demisto, OneLogin & Netskope – Enterprise Security Weekly #106

Proofpoint automates email security with CLEAR, Demisto releases state of SOAR 2018 report, OneLogin and Netskope partner to expand cloud security for enterprises, RedSeal launches remote administrator managed service, Corelight expands network securit… Continue reading CLEAR, Demisto, OneLogin & Netskope – Enterprise Security Weekly #106

Network security appliances vs. Word and PowerShell

Over the last few months we have seen a surge in attacks using apparently innocent documents that install malware covertly on victims’ systems.
Unless you are running specialist monitoring tools, or very effective security software, you probably won’t … Continue reading Network security appliances vs. Word and PowerShell

Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

Register Now and Learn IoT Hacking Step-by-Step! Independent Security Evaluators (ISE), the people behind the IoT Villages of DEF CON, RSA, DerbyCon and more, will showcase live demos of hacking IoT devices, the methodology for repeatable success and c… Continue reading Webinar: Basics of IoT Hacking for the Career Pen Tester on Sept 27 2018

How Important Is It to Take CCNA Course for IT Professionals?

Computer transformed the working techniques in the organizations by making it easier and feasible for the companies to achieve their targets and manage sustainable growth in the organization. It has simplified the means of communicating to the clients … Continue reading How Important Is It to Take CCNA Course for IT Professionals?