One of the best Information Security commercials I have seen

  One of my all-time favorites Information Security commercial. Very good for security awareness lectures.   (No Ratings Yet. Be the first to rate this content!) Loading...

Hilarious – James Veitch: This is what happens when you reply to spam email

  Originally posted by Mr. Omri Moyal on Facebook. James Veitch is a comedian (naturally…)   (1 votes, average: 2.00 out of 5) Loading...

Possible vulnerability in F5 BIG-IP LTM

Possible vulnerability in F5 BIG-IP LTM
About a year ago, while I was performing a web site penetration test for a customer, I run a manual fuzzing phase, where I like to “question” even the most basic networking and application conventions, and this time it paid off more than the usual… The site was behind a “F5 Networks” BIG-IP device, running ...

Practice what you breach

(That’s it. Only a title. An Idiom I thought about) (No Ratings Yet. Be the first to rate this content!) Loading...

How to protect yourself from the Samsung keyboard vulnerability in Android devices

A few weeks ago, on June 2015, the mobile devices security company “NowSecure”, has published a post about a vulnerability they have found, titled “Remote Code Execution as System User on Samsung Phones Summary”, discovered by its researcher, Mr. Ryan Welton. This research was also marked using two official vulnerability identifications of CVE-2015-4640 and CVE-2015-4641. ...