Tuesday, May 14, 2019
Posted by manager
Reader's rate:
0
Contributed by Chris Choyce This paper will define and analyze injection attacks and dive into why the attack surface is one of the largest available for adversaries. There are several types of injection attacks and they all involve the manipulation of code at a public available “doorway... + continue reading
Monday, May 13, 2019
Posted by manager
Reader's rate:
0
Contributed by Craig Olson: This paper explores the disruptive impact of coin miners on public as well as private sector entities and it also presents best practices for inoculating organizations against nefarious cryptojacking attacks. The past few years have seen an unprecedented global surge in... + continue reading
Thursday, May 9, 2019
Posted by manager
Reader's rate:
0
Contributed by Tristan Irvin Social engineering plays a key role in information security. Many attacks are social engineering attacks, and they can cause significant damage to a business – whether indirectly or directly. Social engineering attacks attempt to steal private information... + continue reading
Wednesday, May 8, 2019
Posted by manager
Reader's rate:
0
Contributed by Jordan Lydon With the advent of modern computing and the desire to always have more compute power and faster access to data, some companies are beginning to look towards different options to potentially be on the forefront of the future of computing. A lot of big names in the... + continue reading
Tuesday, May 7, 2019
Posted by manager
Reader's rate:
0
Contributed by Vinay Sawant Artificial Intelligence (AI) technology is growing at very fast rate and its use is increasing in various fields day by day. Today, Artificial Intelligence is used in many different fields like self-driven cars, medical field, astronomy, robotics, aviation, computer... + continue reading

Home Page

Featured Articles

Tuesday, 14/05/19 - 0 comment(s)
Contributed by Chris Choyce This paper will define and analyze injection attacks and dive into why the attack surface is one of the largest available for adversaries. There are several types of injection attacks and they all involve the manipulation of code at a public available “doorway” to the data store that is threatened. The two... + continue reading
Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to handle unknown challenges. It is targeted towards reducing human effort and intervention. Identity and Access Management (IAM) is also not an exception... + continue reading

Red Tape

Wednesday, 20/02/19 - 0 comment(s)
Contributed by Subhrodip Roy Chowdhury In recent years, machine learning is revolutionizing almost every field of science due to its unique properties like adaptability, scalability and ability to... + continue reading

Cryptography

Monday, 22/05/17 - 0 comment(s)
Contributed by The following paragraphs will how show someone can make sure that a website has a digital certificate, what is a digital certificate and what are the available types, why they... + continue reading

Exploitation

Tuesday, 14/05/19 - 0 comment(s)
Contributed by Chris Choyce This paper will define and analyze injection attacks and dive into why the attack surface is one of the largest available for adversaries. There are several types of... + continue reading

Sistema

Tuesday, 07/05/19 - 0 comment(s)
Contributed by Vinay Sawant Artificial Intelligence (AI) technology is growing at very fast rate and its use is increasing in various fields day by day. Today, Artificial Intelligence is used in... + continue reading

Et Cetera

Monday, 13/05/19 - 0 comment(s)
Contributed by Craig Olson: This paper explores the disruptive impact of coin miners on public as well as private sector entities and it also presents best practices for inoculating organizations... + continue reading

Recommended Reading

Monday, 19/03/18 - 0 comment(s)
Written by Gabriella Coleman I was personally interested in reading about Anonymous and bought this book to satisfy that urge.  It was released in 2014/2015 but an interesting read to... + continue reading