Top Rated Articles
This is an ENISA deliverable aiming to facilitate a knowledge transfer of IT Business Continuity issues to Small Medium Enterprises (SMEs).
Categories: BCP and DRP 
18.12.2013 · From admin
Since our last report, malware and related IT security threats have grown and matured. Malicious code authors are far more adept at camouflaging their work— using the dark parts of the Internet—creating new threats that are smarter, shadier and stealthier.
18.12.2013 · From admin
In this paper (attached below) it describes a new acoustic cryptanalysis key extraction attack, applicable to GnuPG’s current implementation of RSA. The attack can extract full 4096-bit RSA decryption keys from laptop computers (of various models), within an hour.
Categories: Air Gap  · Freeky Stuff...  · Cryptography Attacks 
20.12.2013 · From admin
This presentation will coach you on how to become a CISSP from A to Z. It will give you tips and trick to master the CISSP CBK and teach you how to pass this dreaded exam the first time you take the test. It is a must watch for anyone serious about becoming a CISSP.
Categories: CISSP exam 
24.12.2013 · From admin
CompTIA has announced the venue of Security+ 401 by the end of the first quarter of 2014.. This article shows the changes that were introduced in the new version of the exam.
Categories: Security+ 401 
29.12.2013 · From admin
Finally, here is my first attempt at this new type of questions showing up on the exam.
Categories: CISSP exam 
03.02.2014 · From admin
As seen on the great http://www.stefanomele.it/ web site. For the first time the U.S. Army has released an official doctrine manual on military activities in cyberspace, the "FM 3-38 Cyber Electromagnetic Activities".
Categories: Cyber Defense Operations 
25.02.2014 · From admin
The Open Source Security Testing Manual from ISECOM. A fantastic project from my friend Pete Herzog. If you believe in true security this is a must know web site and content.
Categories: OSSTMM & ISECOM 
25.02.2014 · From admin
It's a great opportunity to learn in-depth details about the OSSTMM, especially OSSTMM 4, in a great setting. Plus the price is undeniably good. Seriously.
Categories: OSSTMM & ISECOM 
25.02.2014 · From admin
This is a thorough introduction to what Security+ is and what is required to become certified.
Categories: Security+ Online CBT 
02.03.2014 · From admin
Windows 8.1 claim to stop the Pass-The-Hash attack. Smart Card’s Pass-the-Hash perils does not stop at its false sense of security.
08.03.2014 · From admin
See below a short list of Linux Distribution you can use for Security Testing, Penetration Testing, or other security purpose. As usual, if your preferred distribution is not on the list let me know.
08.03.2014 · From admin
See this article to find out what are the new topics that were added to the new CISSP® CBK® version 2015.
Categories: CISSP CBK 2015 
12.04.2015 · From admin
Demand for cybersecurity professionals greatly exceeds demand, making it one of the hottest fields in the technology job market, according to a report from Burning Glass Technologies, an employment data and consulting company.
Categories: Career  · Jobs 
10.03.2014 · From admin
Acunetix is once again confirmed as one of the leaders in web application scanning with a 100% detection accuracy and 0% false positives for Reflected Cross-Site Scripting and SQL Injection vulnerabilities, together with a leading WIVET assessment score.
12.03.2014 · From admin
This is a short article that tell you more about CCCure and who are the people behind it as well.
Categories: CCCure Information 
12.03.2014 · From admin
Today I have completed the recording of my first computer based tutorial (CBT) for the Access Control Domain. It is almost 9 hours of thorough content that covers 100% of the CBK objectives for this domain.
Categories: CISSP 
12.05.2014 · From admin
CCCure in partnership with SecureNinjaTV is pleased to present the entire Cyber Kung Fu for the Certified Ethical Hacker version 8 training class.
Categories: CEH V8 Training 
17.03.2014 · From admin
SecureNinjaTV CEH V8 Cyber Kung Fu Module 00 Introduction to the hacking scene and class
Categories: CEH V8 Training 
17.03.2014 · From admin
SecureNinjaTV CEH V8 Cyber Kung Fu Module 01 Introduction to Ethical Hacking
Categories: CEH V8 Training 
17.03.2014 · From admin
Per page: