Home Security Page 2

Security

To help you stay up to date with developments in web security, Packt Hub provides news and expert insights. We work with thought leaders to bring you the best advice about topics like malware analysis and penetration testing.

Introduction to Mobile Forensics

0
(For more resources related to this topic, see here.) In 2013, there were almost as many mobile cellular subscriptions as there were people on earth,...

Knowing the SQL-injection attacks and securing our Android applications from them

0
(For more resources related to this topic, see here.) Enumerating SQL-injection vulnerable content providers Just like web applications, Android applications may use untrusted input to construct...

Public Key Infrastructure (PKI) and other Concepts in Cryptography for CISSP Exam

0
Public key infrastructure Public Key Infrastructure (PKI) is a framework that enables integration of various services that are related to cryptography. The aim of PKI is...
Linux Foundation launches the Acumos Al Project to make AI accessible

How artificial intelligence can improve pentesting

0
686 cybersecurity breaches were reported in the first three months of 2018 alone, with unauthorized intrusion accounting for 38.9% of incidents. And with high-profile...

Pentesting Using Python

0
 In this article by the author, Mohit, of the book, Python Penetration Testing Essentials, Penetration (pen) tester and hacker are similar terms. The difference...
ship in sea

How to secure ElasticCache in AWS

0
AWS offers services to handle the cache management process. Earlier, we were using Memcached or Redis installed on VM, which was a very complex...

Why did Uber created Hudi, an open source incremental processing framework on Apache Hadoop?

0
In the process of rebuilding its Big Data platform, Uber created an open-source Spark library named Hadoop Upserts anD Incremental (Hudi). This library permits...

Network Evidence Collection

0
In this article by Gerard Johansen, author of the book Digital Forensics and Incident Response, explains that the traditional focus of digital forensics has...
Top 5 cybersecurity assessment tools for networking professionals

Top 5 cybersecurity assessment tools for networking professionals

0
Security is one of the major concerns while setting up data centers in the cloud. Although firewalls and managed networking components are deployed by...
NetSpectre attack exploits data from CPU memory

Dark Web Phishing Kits: Cheap, plentiful and ready to trick you

0
Spam email is a part of daily life on the internet. Even the best junk mail filters will still allow through certain suspicious looking...

Must Read in Security

Top 6 Cybersecurity Books from Packt to Accelerate Your Career

0
With new technology threats, rising international tensions, and state-sponsored cyber-attacks, cybersecurity is more important than ever. In organizations worldwide, there is not only a dire need for cybersecurity...

Win-KeX Version 2.0 from Kali Linux

Interviews