Introduction to Mobile Forensics
(For more resources related to this topic, see here.)
In 2013, there were almost as many mobile cellular subscriptions as there were people on earth,...
Knowing the SQL-injection attacks and securing our Android applications from them
(For more resources related to this topic, see here.)
Enumerating SQL-injection vulnerable content providers
Just like web applications, Android applications may use untrusted input to construct...
Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam
Public key infrastructure
Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography.
The aim of PKI is...
How artificial intelligence can improve pentesting
686 cybersecurity breaches were reported in the first three months of 2018 alone, with unauthorized intrusion accounting for 38.9% of incidents. And with high-profile...
Pentesting Using Python
In this article by the author, Mohit, of the book, Python Penetration Testing Essentials, Penetration (pen) tester and hacker are similar terms. The difference...
How to secure ElasticCache in AWS
AWS offers services to handle the cache management process. Earlier, we were using Memcached or Redis installed on VM, which was a very complex...
Why did Uber created Hudi, an open source incremental processing framework on Apache Hadoop?
In the process of rebuilding its Big Data platform, Uber created an open-source Spark library named Hadoop Upserts anD Incremental (Hudi). This library permits...
Network Evidence Collection
In this article by Gerard Johansen, author of the book Digital Forensics and Incident Response, explains that the traditional focus of digital forensics has...
Top 5 cybersecurity assessment tools for networking professionals
Security is one of the major concerns while setting up data centers in the cloud. Although firewalls and managed networking components are deployed by...
Dark Web Phishing Kits: Cheap, plentiful and ready to trick you
Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking...