In this video we explore steganography which is the art of hiding data in plain sight. I use OpenPuff to demonstrate hiding a message in an image file and using a decoy for plausible deniability. Videos and music files are also good carriers for secret steg
In this video we are going to explore the zero trust model; - A fundamental strategy to mitigating online threats. - The zero trust model is a must do security control that if you're not using. You should be! Let's find out if you are. For more weekly
In this video we explore phishing attacks. - How phishing scams are performed and - Why are they so effective. - Demonstrating techniques used by hackers and phishers. - Plus SMShing and vishing! For more weekly updates! SUBSCRIBE
In this video we explore mac spoofing, why you might want to spoof your mac address and how to actually change your mac on all platforms Microsoft Windows, Mac OS X and Linux. For more weekly updates! SUBSCRIBE Windows OS X Mac Spoofing How
Find Out More! Course Description Learn a practical skill-set in defeating all online threats including - advanced hackers, trackers, malware, zero days, exploit kits, cyber criminals and more.Go from a beginner to advanced in this easy to follow
Here is a non-exhaustive list of information that you should consider before revealing online or giving to companies. Personally Identifiable Information (PII) • Full Name• Email address• Home
A list of sites to test your browser privacy, security and
The latest spotted security, hacking, forensics and privacy tools. Skydive : a real-time network analyzer - Read more A curated list of Awesome Threat Intelligence resources - Read more A curated list of tools for incident response - Read
The TOR browser is now using search.disconnect.me as the default search engine. I noticed they were offering TLS_DHE_RSA_WITH_AES_128_CBC_SHA (0x33) with 1024 bits Diffie-Hellman key exchange and using common primes. The client would have to elect to use
Here are the latest security and privacy software and tools for Jan 2016 exe2hex - Inline file transfer using debug.exe and/or PowerShell. Encodes a executable binary file into ASCII text Cuckoo Sandbox 2.0 Release Candidate 1 Stratosphere Linux IPS -
It’s a good time to start talking about the increasing reliance vehicles have on internal computers and how this impacts your safety, security and privacy. I'm going to cover the current cyber security vulnerabilities in these on-board computers, discuss what
Here is a useful repository of active phishing sites that offers free phishing intelligence feeds.
After 10 years of our previous branding and design it was time for a shack up and a new look for our corporate branding and website. We hope you like the change.
Social Engineering uses influence and persuasion in order to deceive, convince or manipulate. As a result, the social engineer is able to take advantage of people to obtain information with or without the use of technology. The following is an example of a