Effects of Biometrics Co-Used with Password
It appears that, amazingly, many people are still trapped in a false sense of security that biometrics helps us for …
Read MoreNetworks, What do you mean by that?
Have you ever heard of words like Generation X, Generation Y, Lost generation, etc.? These are the words that are …
Read MoreThick Client Penetration Testing – Exploiting JAVA Deserialization Vulnerability for Remote Code Execution
Thick Client? What do you mean by that? Thick client is the kind of application which is installed on the …
Read MoreExtending attack surface in distributed environments
I am currently working in the RCNTEC company where I have a deal with distributed environments everyday. Once I had …
Read MoreDo You Think Your Mobile is Secure with a Finger Print? Think Again!
With smartphones companies allowing people a convenience to perform multiple tasks and purchase transaction over their phone, also opens the …
Read MoreThere is a shell in your lunch-box by Rotimi Akinyele
My team was recently engaged by a client (Hackme) to perform a black-box external penetration test. The objective was simple …
Read MoreWhy Python Isn’t Just for Beginners
Programming in general can be an intimidating task, especially if you’re new to the field. That’s why finding a language …
Read MoreSecurity Risks with Public and Private Blockchains
Before we begin to understand the security risks associated with private and public blockchains, let us first define what a …
Read MoreZeus Scanner - Advanced dork searching
 What is Zeus? Zeus is an advanced dork searching tool that is capable of bypassing search engine API calls, …
Read MoreMake sure not to mix up 'Identification' with 'Authentication'
Tech media seem busy arguing on which biometrics is better than the others. But it is all nonsense from security’s …
Read More