How to secure your mobile phone and check for spyware?
Can a pen and paper really save you from a Cyber Incident?
A Generic Incident Playbook
Log4j vulnerability information and 4x steps to prioritise
Programming and Cyber Security
The WhatsApp Privacy Question
Free Cyber Incident Playbooks on GitHub
HOW TO PROTECT AGAINST THE NEW PHISHING ATTACKS GETTING AROUND MFA (CONSENT PHISHING)
SOME CYBER INSURANCE CLAIMS IMPACTED BY COVID-19?
FREE CYBER SECURITY TESTING FOR SMALL BUSINESSES IN MAURITIUS
The problem with password expiry
Afer 17 years, a NEW BUGS Cryptography Package for Unix (version 4.1.2)
2019 CYBER SECURITY TRENDS REPORT OVERVIEW
PHISHING PROTECTION FRAMEWORK
NATIONAL CYBER SECURITY DRILL 2019
HOW TO CHOOSE MICROSOFT 365 SECURITY PLANS AND ADD-ONS: E3, E5, EMS E3, EMS E5, 365 E3, 365 E5
New Download section with Presentations
FREE Cyber Security Event - 3rd Episode!
MU.SCL - Second Meeting for the Mauritius Cyber Security Club
MU.SCL - The Birth of a Cyber Security Club in Mauritius
FIRST Technical Colloquium 2017 in Mauritius - Our presentation on IDS
Today's Cyber Security Risk Context
GDPR and what it means to companies in the Indian Ocean and Africa
Are Cyber Security Challenges and Opportunities in Mauritius and Africa different from Europe?
Cyber Security Planning - A simple 6 Steps Approach
The 2015 SANS Holiday Hack Challenge Write-Up
How to build an efficient Anti-Phishing Framework?
How to build a Red Team and Why?
RANT FORUM - Red Team Recipes Presentation
IDS used as a Network Forensic Tool
IDS used as an Offensive Security Tool
Securing your Cloud Storage with a Boxcryptor alternative called EncFS
How to reduce WEB 2.0 attack surface by going back to WEB 1.0, the dynamic way!
SELKS 2.0 vs. Security Onion
BlackHat Mobile Security Summit - London 2015
Hackfu2015 Challenge 7 - Solution
Hackfu2015 Challenge 5 - Solution
Hackfu Challenge 2015 - Solution for Challenge 1
One more update to the Security Onion Guide
Updated Security Onion Guide
How to setup PIWIK to track visitors' downloads
How to setup Security Onion on a home network with Splunk, email alerts and some basic tuning
Fix for compiling VMwaretools 9.9.2 on kernel 3_18+
iOS Backdoors
Critical Infrastructure and Cyber attacks
Heartbleed, do not panic!
Using a phone as a keylogger, next it will be a smartwatch!
New iPhone 5S Fingerprint reader, a step in the right direction!
Mobile Device Management Limitations
The right (way) to disclose vulnerabilities
iOS7 and Mavericks Security
A story about Password: The Wrong Formula
Evernote hacked, an early warning for the Cloud Storage storm coming?
Mobile devices security, history repeating itself: Harder, Faster, Stronger but not Better!
Boxcryptor, a great tool to secure your cloud storage solution.
Security Onion and seeing through HTTPS
Is that the holy grail for critical systems?
Old tricks will always work…
Distributed Credential Protection
MD5 Security Flaws
An interesting timeline representation of the CloudFlare’s hack
Flame and the DEB93D trail
Apple in Denial
Satellite phones encryption attacked
John Nash on Cryptography
Bringing Your Own Device, a Security challenge.
Koobface, The dangerous game of naming and shaming
Most websites are vulnerable to a hash collision DOS attack
Encrypting DNS queries with DNSCrypt from OpenDNS
Twitter helping with Android’s Security
Carrier IQ, an interesting story of deception or what we could call the Facebook syndrome
Next Generation Firewall
I used to have one password…
An action on Data Privacy
New Dropbox Issues and a work around
Dropbox in the Enterprise
Worrying trends with Dropbox
Turning point for Apple Products Security
Free Forensic Resources
Extreme Pen Testing
Mobile device security questions
An interesting attack on Voice Over IP Security
What could be the impact of the RSA breach
Apple Security
What does SSD drives have to do with IPv6?
The rise of Memory Scrapping attacks and what it means to IRM, Disk Encryption and Thunderbolt
The inevitable rise of malware on mobile devices
Do what I say not what I do
The world of Computer Forensics
New iOS Security attack, this time it looks bad!
A Case Study, when Standard Security Certifications are not always your friend!
The increasing risk of 3G+ network within the corporate world
Follow-up on Apple iOS Full Disk Encryption
Apple and their elusive Full Disk Encryption solution
Full Disk Encryption Attacks
Cellular Network Attacks
Android vs iOS Security
The scary world of Social Media and geo tagging
PS3 Hacked and Cryptography
Interesting acquisitions
Stuxnet, a Digital Worm with physical consequences (not to say political!)
Are you taking ZeuS wrath seriously?
A funny case for not reusing passwords
Arcsight, another expensive acquisition… sorry, merger!
DoD Windows OS Security guides
Apple new Patent could mean Big Brother on your phone
New York Times Article on Russian Harcker’s Arrest
Intel set to acquire McAfee for £5 billion
Weekly Digest #3 – Interesting Articles
Weekly Digest #2 – Interesting Articles
Weekly Digest #1 – Interesting Articles