Knowing the SQL-injection attacks and securing our Android applications from them
(For more resources related to this topic, see here.)
Enumerating SQL-injection vulnerable content providers
Just like web applications, Android applications may use untrusted input to construct...
Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam
Public key infrastructure
Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography.
The aim of PKI is...
How artificial intelligence can improve pentesting
686 cybersecurity breaches were reported in the first three months of 2018 alone, with unauthorized intrusion accounting for 38.9% of incidents. And with high-profile...
How to secure ElasticCache in AWS
AWS offers services to handle the cache management process. Earlier, we were using Memcached or Redis installed on VM, which was a very complex...
Why did Uber created Hudi, an open source incremental processing framework on Apache Hadoop?
In the process of rebuilding its Big Data platform, Uber created an open-source Spark library named Hadoop Upserts anD Incremental (Hudi). This library permits...
Top 5 cybersecurity assessment tools for networking professionals
Security is one of the major concerns while setting up data centers in the cloud. Although firewalls and managed networking components are deployed by...
Top 6 Cybersecurity Books from Packt to Accelerate Your Career
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...
Dark Web Phishing Kits: Cheap, plentiful and ready to trick you
Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking...
Google makes Trust Services Root R1, R2, R3, and R4 Inclusion Request
After Google Launched its Certification Authority in August 2017, it has now put in a request to Mozilla certification store for the inclusion of...
Wireshark: Working with Packet Streams
(For more resources related to this topic, see here.)
Working with Packet Streams
While working on network capture, there can be multiple instances of network activities...