Please turn on your JavaScript for this page to function normally.
New book: Troubleshooting Windows 7 Inside Out
You’re beyond the basics, so dive right into troubleshooting Windows 7 and really put your PC to work! Troubleshooting Windows 7 Inside Out describes hundreds of …
Win a copy of Ninja Hacking!
We are giving away two copies of “Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques“. Throw traditional pen testing methods out the window …
New book: Managed Code Rootkits
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when …
New book: Web Application Obfuscation
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take …
Featured news
Resources
Don't miss
- Ransomware attackers are “vishing” organizations via Microsoft Teams
- Scam Yourself attacks: How social engineering is evolving
- Addressing the intersection of cyber and physical security threats
- Fleet: Open-source platform for IT and security teams
- CERT-UA warns against “security audit” requests via AnyDesk