877.791.9571 |

About the Author:

Jeremy Martin is a Senior Security Researcher that has focused his work on Red Team penetration testing, Computer Forensics, and Cyber Warfare. Starting his career in 1995, Mr. Martin has worked with Fortune 200 companies and Federal Government agencies. He has received numerous of awards for service. He has been teaching Advanced Ethical Hacking, Computer Forensics, Data Recovery, SCADA/ICS security, Security Management (CISSP/CISM), and more since 2003. As a published author he has spoken at security conferences around the world. Current research projects include SCADA security, vulnerability analysis, threat profiling, exploitation automation, anti-forensics, and reverse engineering malware. You can find more of Jeremy's writings & services at http://www.informationwarfarecenter.com
drive-06092014

Hard Drive Head Stack Replacement Demo – Data Recovery

Data recovery has been needed since man started to write things down. Why? Because what ever medium they tried to store the data on, it has always been susceptible […]

internet-security

Can You Really Be Anonymous on the Internet?

To some extent, the answer to the question in the title is yes. However there are many variables to consider. Just in the United States, there are many laws […]

Tor_project_logo_hq

The Internet Underground: Tor Hidden Services

Some people think onion routing or the Tor network is for criminals and people with something to hide. Well, they are half right. The Tor network was designed to […]

Standards for Penetration Testing

The cost and quality of penetration tests vary wildly between different vendors. As a response to those differences, a group of security professionals have been developing the Penetration Testing […]