Blog

Ransomware: Mitigating The Threat

I’ve been seeing a lot of posts that jump to conclusions that everyone would be safe from ransomware if they …

read more
Black Box vs. White Box Testing: Key Differences Every Organisation Should Know

In today’s high tech world, no one is truly immune from cyber crime. Whether you’re a big corporation, government entity, …

read more
How to Effectively Build Hacker Personas

A hacker, in digital technology, is a term referring to a person with a tremendously high level of skills in …

read more
Characteristics of a Good Penetration Tester

Penetration testers possess a curious mind and a hunger to know how systems work. While many technical people have a …

read more
Penetration Testing for PCI

What is PCI? Payment Card Industry Data Security Standard (PCI-DSS), or just PCI for short, is a set of security …

read more
Guide to Web Application Penetration Testing

Are you exposing your website and business to a security breach? A lot of businesses take security for granted. Just …

read more
Introduction to Mobile Application Penetration Testing

Are you looking for ways to secure your mobile environment and devices against skilled and deliberate hacker attacks? Hackers can and …

read more
Meeting Steve Wozniak

It was such a privilege and a thrill to have met Steve Wozniak, co-founder of Apple Computers. A true legend …

read more
Reject versus Drop – Which to use?

Packet filtering firewalls follow a methodology whereby they analyse the source, destination and port numbers of traffic as it arrives …

read more
Kali Linux – What’s new?

Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare …

read more