As our world reliance on electronic connection and communication is accelerating, cyber attacks are on the rise along with
counter measure solutions in the form of endless new cyber security companies, consultants, expertise, software and hardware 
aimed at protecting individuals, assets, corporations and even nation states.
However, even with all the tools and increasing cyber budget at our disposal, there is always one constant weak link: 
The Human element in the so called Cyber Kill Chain.
It is this human element that can defeat the most sophisticated defence systems and it is why the use of Phishing and 
Spear Phishing attacks are so prominent and successful.
Those attacks exploit human emotion, ignorance and credibility to bypass defences in tricking users to follow poisonous steps:
Clicking on links, opening documents, accepting/ignoring security warnings and good practises, installing software, etc.... 
   >>[READ MORE] 

 RSS Feeds
 RSS Feeds How to build an efficient Anti-Phishing Framework?
How to build an efficient Anti-Phishing Framework?
 How to build a Red Team and Why?
How to build a Red Team and Why?
 IDS used as a Network Forensic Tool
IDS used as a Network Forensic Tool
 Securing your Cloud Storage with a Boxcryptor alternative called EncFS
Securing your Cloud Storage with a Boxcryptor alternative called EncFS
 How to reduce WEB 2.0 attack surface by going back to WEB 1.0, the dynamic way!
How to reduce WEB 2.0 attack surface by going back to WEB 1.0, the dynamic way! 
 
 
 
 Website update
Website update