We would love to stay in touch with you!

Enter your details to join our mailing list and we'll send you a link to exclusive content.

* indicates required
Close
antibvirus-shellcode
 //  Jago Maniscalchi  //  February 11, 2012  //  No Comments

Anti-virus evasion – 2. Using custom shellcode

In the previous article in this series – Choosing a Payload – we examined the impact that different Metasploit payloads can have on the attack detection rate of popular anti-virus products. We determined that: encoded payloads …

antivirus-msfpayload
 //  Jago Maniscalchi  //  February 4, 2012  //  1 Comment

Anti-virus evasion – 1. Choosing a payload

I know a number of professional penetration testers who refuse to use Metasploit in their professional tests because of the chance it will be picked up by anti-virus systems on their client’s network. Metasploit is a …

couple-password
 //  Jago Maniscalchi  //  February 3, 2012  //  No Comments

What is your password worth?

However you design and protect your information system, authorised users must be able to identify and authenticate themselves. There are a number of recognised methods of authentication, usually described as ‘something I know’, ‘something I have’ …

wef-tech-risks
 //  Luciana de Rossi  //  January 22, 2012  //  No Comments

Cyber attack is new global risk

Every year, the World Economic Forum (WEF), produces a Global Risks Report, highlighting the key themes across the world that present risk to our economies or daily life. This year, for the first time, Information Security …

Digital Threat Manifesto-430px
 //  Jago Maniscalchi  //  December 4, 2011  //  1 Comment

Ten Rules of Information Security

There are a number of rules, or principles, that I firmly believe should be at the heart of any organisation’s Information Security programme. I’ve spent a number of years advising clients on these topics and thought …

couple-password
What is your password worth?
February 3, 2012  //  No Comments
However you design and protect your information system, authorised users must be able to identify and authenticate thems ...
fulldiskencryption
The Benefits of Full Disk Encryption
January 13, 2012  //  2 Comments
The Electronic Frontier Foundation is asking everybody to adopt a New Year’s Resolution for 2012 – to use fu ...
attachment-phishing-featured-image
Phishers using e-mail attachments to evade anti-virus
February 24, 2012  //  No Comments
Phishing is a social engineering attack that involves sending a series of victims an e-mail purporting to be from a bank ...
pin-1234
Guessing banking PINs using statistics
February 27, 2012  //  No Comments
Researchers at the University of Cambridge recently published a paper on PIN security. During their study they analysed ...
antibvirus-shellcode
Anti-virus evasion – 2. Using custom shellcode
February 11, 2012  //  No Comments
In the previous article in this series – Choosing a Payload – we examined the impact that different Metasplo ...
DARKMARKET UK
Dark Market – Lessons on Cyber Crime
November 7, 2011  //  No Comments
Former BBC and Guardian correspondent Misha Glenny is an expert on many subjects. He wrote the definitive account of the ...