BLOGS

September 28, 2016

I have come to learn in the IT security market that we now live in a world where certificates and badges seem to matter the most when people choose a penetration tester firm. I do not know of any hacker that holds any of the governed credentials. So how did this happen? This started with firms and particular bodies attaching guidelines and regulations on...

September 15, 2016

Originally published on Hakin9 Magazine

We’ve always been taught that you are safe if your browser is displaying a little padlock. But is this still true? To answer this question let’s go back to the roots of HTTP (Hyper Text Transfer Protocol).

What exactly is HTTP(S)?

HTTP is the most prevalent protocol used by your computer’s browser to communicate with a...

September 2, 2016

Originally published on Cyber Defense Magazine August 2016

What is Ransomware?

Ransomware is compiled of two words which is Ransom and Ware. As you could guess Ransom sounds like a hostage situation you see in the movies where someone is held in exchange for a large amount of money. Ware is from the term Malware (It is a term used for intrusive or disruptiv...

Please reload

February 10, 2016

Please reload