Home Search
phishing - search results
If you're not happy with the results, please do another search
6 ways businesses can become more digitally secure
Web security is a term we've constantly been hearing about in recent days, especially in the news. We’ve seen an onslaught of high-profile hacks,...
Introduction to Network Security
In this article by Warun Levesque, Michael McLafferty, and Arthur Salmon, the authors of the book Applied Network Security, we will be covering the following...
Security in 2017: What’s new and what’s not
Security has been a problem for web developers since before the Internet existed. By this, I mean network security was a problem before the...
Getting Started with a Cloud-Only Scenario
In this article by Jochen Nickel from the book, Mastering Identity and Access Management with Microsoft Azure, we will first start with a business...
iOS Security Overview
In this article by Allister Banks and Charles S. Edge, the authors of the book, Learning iOS Security, we will go through an overview of...
The importance of Hyper-V Security
In this article, by Eric Siron and Andy Syrewicze, authors of the book, Hyper-V Security, we will be introduced to one of the most...
Creating an Extension in Yii 2
In this article by Mark Safronov, co-author of the book Web Application Development with Yii 2 and PHP, we we'll learn to create our...
Social Engineering Attacks
(For more resources related to this topic, see here.)
Advanced Persistent Threats
Advanced Persistent Threats came into existence during cyber espionage between nations. The main motive...
Security considerations
(For more resources related to this topic, see here.)
Security considerations
One general piece of advice that applies to every type of application development is to...
Social-Engineer Toolkit
(For more resources related to this topic, see here.)
Social engineering is an act of manipulating people to perform actions that they don't intend to...