Home Security Cybersecurity

Cybersecurity

Read the latest Cybersecurity news on the Packt Hub. We feature up-to-date articles on IT security and hacking. We also feature the latest software security updates and cyber security threats.

Knowing the SQL-injection attacks and securing our Android applications from them

0
(For more resources related to this topic, see here.) Enumerating SQL-injection vulnerable content providers Just like web applications, Android applications may use untrusted input to construct...

Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam

0
Public key infrastructure Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography. The aim of PKI is...
Linux Foundation launches the Acumos Al Project to make AI accessible

How artificial intelligence can improve pentesting

0
686 cybersecurity breaches were reported in the first three months of 2018 alone, with unauthorized intrusion accounting for 38.9% of incidents. And with high-profile...
ship in sea

How to secure ElasticCache in AWS

0
AWS offers services to handle the cache management process. Earlier, we were using Memcached or Redis installed on VM, which was a very complex...

Why did Uber created Hudi, an open source incremental processing framework on Apache Hadoop?

0
In the process of rebuilding its Big Data platform, Uber created an open-source Spark library named Hadoop Upserts anD Incremental (Hudi). This library permits...
Top 5 cybersecurity assessment tools for networking professionals

Top 5 cybersecurity assessment tools for networking professionals

0
Security is one of the major concerns while setting up data centers in the cloud. Although firewalls and managed networking components are deployed by...
NetSpectre attack exploits data from CPU memory

Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

0
Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking...

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...
Certification

Google makes Trust Services Root R1, R2, R3, and R4 Inclusion Request

0
After Google Launched its Certification Authority in August 2017, it has now put in a  request to Mozilla certification store for the inclusion of...

Wireshark: Working with Packet Streams

0
(For more resources related to this topic, see here.) Working with Packet Streams While working on network capture, there can be multiple instances of network activities...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews