Security News

  • How to secure your mobile phone and check for spyware?
  • Can a pen and paper really save you from a Cyber Incident?
  • A Generic Incident Playbook
  • Log4j vulnerability information and 4x steps to prioritise
  • Programming and Cyber Security
  • The WhatsApp Privacy Question
  • Free Cyber Incident Playbooks on GitHub
  • HOW TO PROTECT AGAINST THE NEW PHISHING ATTACKS GETTING AROUND MFA (CONSENT PHISHING)
  • SOME CYBER INSURANCE CLAIMS IMPACTED BY COVID-19?
  • FREE CYBER SECURITY TESTING FOR SMALL BUSINESSES IN MAURITIUS
  • The problem with password expiry
  • Afer 17 years, a NEW BUGS Cryptography Package for Unix (version 4.1.2)
  • 2019 CYBER SECURITY TRENDS REPORT OVERVIEW
  • PHISHING PROTECTION FRAMEWORK
  • NATIONAL CYBER SECURITY DRILL 2019
  • HOW TO CHOOSE MICROSOFT 365 SECURITY PLANS AND ADD-ONS: E3, E5, EMS E3, EMS E5, 365 E3, 365 E5
  • New Download section with Presentations
  • FREE Cyber Security Event - 3rd Episode!
  • MU.SCL - Second Meeting for the Mauritius Cyber Security Club
  • MU.SCL - The Birth of a Cyber Security Club in Mauritius
  • FIRST Technical Colloquium 2017 in Mauritius - Our presentation on IDS
  • Today's Cyber Security Risk Context
  • GDPR and what it means to companies in the Indian Ocean and Africa
  • Are Cyber Security Challenges and Opportunities in Mauritius and Africa different from Europe?
  • Cyber Security Planning - A simple 6 Steps Approach
  • The 2015 SANS Holiday Hack Challenge Write-Up
  • How to build an efficient Anti-Phishing Framework?
  • How to build a Red Team and Why?
  • RANT FORUM - Red Team Recipes Presentation
  • IDS used as a Network Forensic Tool
  • IDS used as an Offensive Security Tool
  • Securing your Cloud Storage with a Boxcryptor alternative called EncFS
  • How to reduce WEB 2.0 attack surface by going back to WEB 1.0, the dynamic way!
  • SELKS 2.0 vs. Security Onion
  • BlackHat Mobile Security Summit - London 2015
  • Hackfu2015 Challenge 7 - Solution
  • Hackfu2015 Challenge 5 - Solution
  • Hackfu Challenge 2015 - Solution for Challenge 1
  • One more update to the Security Onion Guide
  • Updated Security Onion Guide
  • How to setup PIWIK to track visitors' downloads
  • How to setup Security Onion on a home network with Splunk, email alerts and some basic tuning
  • Fix for compiling VMwaretools 9.9.2 on kernel 3_18+
  • iOS Backdoors
  • Critical Infrastructure and Cyber attacks
  • Heartbleed, do not panic!
  • Using a phone as a keylogger, next it will be a smartwatch!
  • New iPhone 5S Fingerprint reader, a step in the right direction!
  • Mobile Device Management Limitations
  • The right (way) to disclose vulnerabilities
  • iOS7 and Mavericks Security
  • A story about Password: The Wrong Formula
  • Evernote hacked, an early warning for the Cloud Storage storm coming?
  • Mobile devices security, history repeating itself: Harder, Faster, Stronger but not Better!
  • Boxcryptor, a great tool to secure your cloud storage solution.
  • Security Onion and seeing through HTTPS
  • Is that the holy grail for critical systems?
  • Old tricks will always work…
  • Distributed Credential Protection
  • MD5 Security Flaws
  • An interesting timeline representation of the CloudFlare’s hack
  • Flame and the DEB93D trail
  • Apple in Denial
  • Satellite phones encryption attacked
  • John Nash on Cryptography
  • Bringing Your Own Device, a Security challenge.
  • Koobface, The dangerous game of naming and shaming
  • Most websites are vulnerable to a hash collision DOS attack
  • Encrypting DNS queries with DNSCrypt from OpenDNS
  • Twitter helping with Android’s Security
  • Carrier IQ, an interesting story of deception or what we could call the Facebook syndrome
  • Next Generation Firewall
  • I used to have one password…
  • An action on Data Privacy
  • New Dropbox Issues and a work around
  • Dropbox in the Enterprise
  • Worrying trends with Dropbox
  • Turning point for Apple Products Security
  • Free Forensic Resources
  • Extreme Pen Testing
  • Mobile device security questions
  • An interesting attack on Voice Over IP Security
  • What could be the impact of the RSA breach
  • Apple Security
  • What does SSD drives have to do with IPv6?
  • The rise of Memory Scrapping attacks and what it means to IRM, Disk Encryption and Thunderbolt
  • The inevitable rise of malware on mobile devices
  • Do what I say not what I do
  • The world of Computer Forensics
  • New iOS Security attack, this time it looks bad!
  • A Case Study, when Standard Security Certifications are not always your friend!
  • The increasing risk of 3G+ network within the corporate world
  • Follow-up on Apple iOS Full Disk Encryption
  • Apple and their elusive Full Disk Encryption solution
  • Full Disk Encryption Attacks
  • Cellular Network Attacks
  • Android vs iOS Security
  • The scary world of Social Media and geo tagging
  • PS3 Hacked and Cryptography
  • Interesting acquisitions
  • Stuxnet, a Digital Worm with physical consequences (not to say political!)
  • Are you taking ZeuS wrath seriously?
  • A funny case for not reusing passwords
  • Arcsight, another expensive acquisition… sorry, merger!
  • DoD Windows OS Security guides
  • Apple new Patent could mean Big Brother on your phone
  • New York Times Article on Russian Harcker’s Arrest
  • Intel set to acquire McAfee for £5 billion
  • Weekly Digest #3 – Interesting Articles
  • Weekly Digest #2 – Interesting Articles
  • Weekly Digest #1 – Interesting Articles
  •