Cyber Codes

DOWNLOAD: Google Hacking for Penetration Testers

Google has a set of advanced search operators which can be used to find interesting information about a target website or domain. Our tool aggregates a couple of useful search expressions (Google dorks) that you can use to extract ‘juicy’ data from Google. Every penetration test should start with a passive reconnaissance phase. Since public search engines have gathered huge amounts of information about almost every website from the Internet,

DOWNLOAD: Malware Trend Report H2 2017

About the OIC-CERT Malware Trend Report H2-2017 The OIC-CERT Malware Trend Report H2-2017 is the 3rd of its kind covering malware trends for the 2nd half of 2017. This is an outcome of the Malware Research and Coordination Facility project which is a collaborative effort from the Organisation of the Islamic Cooperation – Computer Emergency Response Team (OIC-CERT), the Asia Pacific Computer Emergency Response Team (APCERT) and other organisations of

Backups Are Essential In The Fight Against Ransomware

Following the recent spate of ransomware attacks on businesses and government agencies across the world, the security press has largely focused on patching and updates as the key to protection against ransomware and malware in general. Thorough patch-management policies are an essential part of doing business online, but the push to patch ignores the fact that many enterprise organizations are not in a position to apply patches as soon as

Hackers are using hotel Wi-Fi to spy on guests, steal data

An advanced hacking and cyberespionage campaign against high-value targets has returned. The so-called ‘DarkHotel’ group has been active for over a decade, with a signature brand of cybercrime that targets business travellers with malware attacks, using the Wi-Fi in luxury hotels across the globe. Hotel Wi-Fi hotspots are compromised in order to help deliver the payload to the selected pool of victims. The exact methods of compromise remain uncertain, but cybersecurity

The Programmer's Oath- Uncle Bob

Managers often put developers in an awkward position by asking them to write ethically ambiguous code. And recently a number of companies have used code to break the law. It’s clear that— just like doctors, lawyers, and business people — developers need to study ethics and apply these principles in their day-to-day work. Some universities are introducing developer ethics courses, but this alone isn’t enough. There are 20 million professional developers out there,

Cyber Codes: How it Works

Cyber Codes: How it Works When was the last time you sent a coded message? Well, probably within the last hour, if you’ve sent an email or logged onto a website. We use codes all the time because we communicate our private messages in public. Without codes, sending information online over unsecured networks or networks with security holes would be like standing in Times Square and shouting your innermost secrets