Cyber Security News & Resources

A Guide To Red Team Security Testing And Remediation

A Guide To Red Team Security Testing And Remediation

Redteam is a leading provider of Penetration Testing, Social Engineering and Red Teaming services. They have offices in North America, UK, Australia, Spain, Vietnam, China, Italy and India. It has earned a good name as one of the top IT consulting companies. With over...

The Complexities of Bank Cyber Security

The Complexities of Bank Cyber Security

Bank Cyber Security is an ongoing concern to many financial institutions. Due to the recent upswing in Internet fraud and other crimes, more banks and lending institutions are investing in cyber security for their networks. While it is true that the costs of cyber...

What to Do If You Just Got Ransomware on Your Computer

What to Do If You Just Got Ransomware on Your Computer

There are many security holes in the current crop of malicious software such as the recently released Remote Access Virus that is what to do when it comes to dealing with Ransomware. This type of malware is one that is commonly referred to as "malware" (malicious...

What Is a Thumb Drive?

What Is a Thumb Drive?

The other day I was talking to someone who has an IT background and she asked me what is a thumb drive? She wanted to know about RDI-MS (Remote Direct Memory Devices) and what they are used for. Well, let me tell you, that is quite a loaded question and one that need...

What Is Social Engineering?

What Is Social Engineering?

What is Social Engineering? Social Engineering is basically a penetration technique that hackers use to gain access to secure and private data, usually by using some important knowledge about the targeted victim or simply by tricking and influencing the targeted user...

Automating Web Application Testing

Automating Web Application Testing

Types of Penetration Testing For Web Applications can be performed in two manners: either by simulated an on-line attack or by performing an on-line attack internally. This facilitates the detection of any vulnerabilities that may exist inside the internal corporate...