Browse Articles By Period: 2014
Curso de Criptografia - em Português. My good friend Galeno Garbe has contributed a nice tutorial for the Cryptography domain. I invite any Portugese members to let me know about other resources that exists in the portugese language and I will keep adding them under this category.
06.07.2014 · From admin
There are multiple websites dedicated to learning how to code and some of them are really great. See within this article some of my personal choice and I welcome you to submit your own list of sites as well.
Categories: Programming Lessons 
03.07.2014 · From admin
As companies turn to digital technologies for business solutions, the risk of a security breach continues to rise. For the last 11 years, the security of information technology and data has been rated as a top technology initiative in surveys conducted and published by the AICPA.
Categories: Law  · SEC 
03.07.2014 · From admin
Government and business are under constant cyber attack and must learn to "take the hit," says the director of a new cybersecurity training programme.
Categories: cybX 
03.07.2014 · From admin
As digital technology transforms 21st century life, questions about privacy rights abound. The U.S. Supreme Court ruled on one such question in late June: if you are arrested, can the police search your cell phone without first obtaining a warrant?
Categories: Magazines (Online)  · Forensics  · Law  · Mobile Devices 
01.07.2014 · From admin
In this article you will find a short list of some of the leading books you can use to help you learn the content of the CBK®.
Categories: CISSP Study Books 
28.06.2014 · From admin
People are not proactive, they are reactive and sometimes plain negligent. There are still people and even people who are working in security that have not heard of Heartbleed and they don't even know what it is. Opportunities for the crackers for sure....
Categories: SSL and TLS 
28.06.2014 · From admin
Writing passwords in Clear Text on a sticky note is bad, showing password in public media is even worst. See this behind the scene photograph of the World Cup security centre in Brazil, as published by local news outlet Correio Braziliense.
Categories: Password Insecurity 
27.06.2014 · From admin
This is ridiculous at best. Another student taking test today lost his money because he did not read his legal agreement (NDA) fast enough and the exam timed out on the NDA. Since when is signing a legal agreement done under the gun.
Categories: CISSP exam 
27.06.2014 · From admin
The nationwide shortage of cybersecurity professionals has made for a more complex threat landscape for organizations of all kinds, but the when it comes to the US federal government, it creates risks for national and homeland security too.
Categories: Career  · Jobs 
21.06.2014 · From admin
Acunetix Free Scan will identify network security issues including the feared Heartbleed to allow businesses to fix them in time
19.06.2014 · From admin
My friend Sid has some very interesting training for people who wish to learn more about Application Security.
17.06.2014 · From admin
I received an email from Qualys with some FREE security tools they offer. They are really worth a look.
Categories: Security Tools 
04.06.2014 · From admin
Malware creation has broken all records during this period, with a figure of more than 15 million new samples, and more than 160,000 new samples appearing every day, according to Panda Security.
Categories: Threat Intelligence 
01.06.2014 · From admin
The National Institute of Standards and Technology (NIST) has requested public comments on its newly proposed "Secure Hash Algorithm-3" (SHA-3) Standard, which is designed to protect the integrity of electronic messages.
Categories: NIST Documents  · Hashing Algorithms 
01.06.2014 · From admin
Good day to all, below you will find a series of links to new white papers and documents that have been published lately.
30.05.2014 · From admin
A great story by Krebs on Security about Truecrypt shutting down for good.
30.05.2014 · From admin
CEH V8 - Module 19 Cryptography (46 Minutes)
Categories: CEH V8 Training 
27.05.2014 · From admin
Another nice video from Sam Bowne showing how a Fortigate 30D is affected by an RA Flood.
Categories: IP V6  · IP V6 Attacks 
26.05.2014 · From admin
Great Video by Marc Heuser on the insecurities of IP V6. A must watch for all.
Categories: IP V6 
20.05.2014 · From admin
Per page: