877.791.9571 |

About the Author:

Albert has five years experience in the information security field, encompassing SIEM, malware analysis, investigating security incidents, ISO 27001 audits and hardening of various devices. He has also carried out rule-based auditing for firewall forensics as well as PCI dss audits.
clickjacking12062013

Hijacking Clicks

Introduction

Clickjacking or the UI redress attack is a relatively new type of malicious attack that targets mainly web applications. It works by superimposing a webpage over another existing web […]

bank-fraud-2013-12032013

Banking Frauds of 2013

Introduction

Technology has changed the way that we work and operate; the flood of advances that we see daily are mind-boggling in their variety and quantity. While technological advances are […]

cookies-11152013-x

Risk Associated with Cookies

,

Overview

The Internet is surely the best resource to gather any kind of information about products, shops, customer complaints, user experience, etc. Companies are trying to attract users’ browsing interest […]

TunnellingS3-111413

Tunnelling SSH Traffic

,

Overview

Security plays an important role in our internet world. As the number of users on the internet increases, it’s necessary to have secure communication between the sender and the […]

exploit-kit-10222013

Battling with Cyber Warriors- Exploit Kits

Introduction

In today’s environment of highly interconnected system necessities, bringing down a system may cause a catastrophic damage to an individual in many ways. Hackers are frequent in the market, […]

sslw

BEAST vs. CRIME Attack

Some months ago there was a top story popping up in almost all the security news feeds about CRIME attacks being able to break SSL. In this article, I […]

piggy-bank-sized

Hesperbot: An Atrocious Banking Trojan

Overview

Last month, a newly effective banking trojan has been discovered, targeting online banking users. This malware uses very reliable looking link addresses or domains which are related to trusted […]

peeping09172013

Peeping the Social media

1. Synopsis

Nowadays it is hard to find a person who doesn’t sign in to any social medium at least once a week by using gadgets like a smartphone, tablet, […]

MemoryMalware-09062013

The Hunt for Memory Malware

Memory forensic is a skill to find out all the artefacts in the memory that is present in the running computer. It is an interesting method to find out […]

BiosSecurity07312013

Anatomy of BIOS Security

Introduction

Computer security has become much harder to manage in recent years, and this is due to the fact that attackers continuously come up with new and more effective ways […]