Rafael Souza (CISOof hackers online club) introduces the fundamentals of Google Hacking ABSTRACT Readers, I introduce a little about a very interesting technique that is Google Hacking, is a key to investigate if we are doing a pentest, or...
Security experts at Trend Micro detected a new variant of AutoCAD Malware that leaves victims hackable for further cyber attacks. Malware researchers at Trend Micro spotted AutoCAD Malware codenamed ACM_SHENZ.A.
Open Space Technology ( OST) is an approach for hosting meetings, conferences, corporate-style retreats, symposiums, and community summit events, focused on a specific and important purpose or task-but beginning without any formal agenda, beyond the overall purpose or theme. Highly scalable and adaptable, OST has been used in meetings of 5 to 2,100 people.
Introduction I’ve already discussed SSL in my previous article. Here I’ll be explaining SSLv3. It was developed by Netscape. General SSL Architecture It was designed to secure end-to-end services on the internet.
Introduction Error Level Analysis is a forensic method to identify portions of an image with a different level of compression. The technique could be used to determine if a picture has been digitally modified.