Please turn on your JavaScript for this page to function normally.
Review: Automating Open Source Intelligence

Editors: Robert Layton and Paul Watters Pages: 222 Publisher: Syngress ISBN: 0128029161 Introduction You can discover a lot – too much, some believe – by digging …

Google
Review: Google Hacking for Penetration Testers, Third Edition

Authors: Johnny Long, Bill Gardner, Justin Brown. Pages: 234 Publisher: Syngress ISBN: 0128029641 Introduction The Internet can be a great source of information, and Google …

Google earth
Review: Google Earth Forensics

Learn how to use Google Earth geo-location in your digital forensic investigations.

Netwrix Auditor
Review: Change and configuration auditing with Netwrix Auditor 7.0

Netwrix Auditor is a powerful change and configuration auditing platform that leverages the data collected from all parts of the company network to provide detailed …

IoT
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts

Author: Nitesh DhanjaniPages: 296Publisher: O’Reilly MediaISBN: 1491902337 Introduction Whether you like it or not, the Internet of Things is happening. As the author …

Keyboard
Next Generation Red Teaming

Author: Henry DalzielPages: 46Publisher: SyngressISBN: 0128041714 Introduction Do you know the difference between penetration testing and red teaming? This book will explain …

encryptr
Encryptr: Open source cloud based password manager

Encryptr is based on the Crypton JavaScript framework. The whole idea behind the Crypton concept is to enable developers to store data on the remote server in such way that …

becrypt tvolution
Using tVolution Mini, a portable secure desktop

tVolution Mini is Becrypt’s answer to the increased threats associated with remote working. It is a smart thin client solution that comes in the form of an extremely …

cloud binary
Cloud Storage Security, A Practical Guide

Authors: Aaron Wheeler and Michael WinburnPages: 144 pagesPublisher: ElsevierISBN: 0128029307 Introduction Practically everybody keeps at least some of their data in the …

nowsecure lab
NowSecure Lab cloud: Mobile app assessment environment

NowSecure was one of the companies that caught my attention at this year’s RSA Conference in San Francisco. While it initially seemed like a new player in the field, the …

raspberry pi
Penetration Testing With Raspberry Pi

Authors: Joseph Muniz, Aamir LakhaniPages: 142 pagesPublisher: Packt PublishingISBN: 1784396435 Introduction Raspberry Pi is a small and portable single board computer that …

Scany
Scany: Network scanner for iOS

Over the past five years I tested quite a few iOS applications that could be used for providing quick snaps of the local network. Most of them were free applications and very …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released whent there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools