New Realities In Aviation Security
Summary of the presentation and research done – By Hugo Teso According to Teso, there are two sub-parts when it […]
Summary of the presentation and research done – By Hugo Teso According to Teso, there are two sub-parts when it […]
Summary: LinkedIn has a feature called Project wherein you can add project members from your connections. We were able to […]
Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or […]
From the year 2012-2025 ICAO(International civil aviation organization) have decided to transform the present aviation environment by introducing new […]
Many times we receive SMS’s on our cell phones displaying messages like the one shown below: Typically a phone number […]
Below are the steps of how to fix the banner (version information) in IIS 7.5 Install the latest version of […]
For my research, I chose to analyze a popular Android application for malwares. But why select a Russian version? Well, […]
Scope: This article demonstrates logging techniques in MySQL to uncover and analyze any mischief attempts done by (outside or inside) […]
A recent dive into challenges faced from privacy compliance requirements unearthed an interesting patent. The unearthing of this new patent on the block came from the need of anonymizing data for several reasons including compliance (PCI DSS, German Data Privacy Law [BDSG], UK Data Privacy Act).
Phishing sounds similar to fishing. Fishes are to the volume of internet users today much like fishermen are to phishers. […]