Trend Now

Top Penetration Testing Tools

What is Penetration Testing Penetration testing, commonly referred to as pen testing, involves an authorized simulation of a cyber attack on a computer system to...

Featured Post

Recent Updates

Ethical hacking & cyber security pen testing

Top Penetration Testing Tools

What is Penetration Testing Penetration testing, commonly referred to as pen testing, involves an authorized simulation of a cyber attack on a computer system to uncover exploitable vulnerabilities. This process is conducted by ethical hackers...
what is phishing

What is Phishing?

Phishing is a kind of scam that happens online, where criminals send emails which appear to have come from a legit company and request you to provide some sensitive information. They do this by...
malware

How to Keep Your Personal Information Secure

For businesspeople, identity theft is a genuine threat for which precautions must be taken. All the way from financial statements to credit card information, everything needs a safety lock on it to ensure protection....
identity-phishing

VeriSign and Microsoft tie-up to tackle phishing

The solutions take advantage of technology from Microsoft, code-named "InfoCard," the Microsoft Internet Explorer 7 browser, as well as VeriSign Secured Sockets Layer (SSL) certificates and the newly launched VeriSign Identity Protection (VIP) to...
Microsoft

Microsoft to spend $4B in China

Microsoft China spokesperson Roger Chen noted that the hardware purchases will consist mainly of Xbox products manufactured in China. The deals have been made following a trip by Chinese president Hu Jintao to America, during...

Most Popular

Top Penetration Testing Tools

What is Penetration Testing Penetration testing, commonly referred to as pen testing, involves an authorized simulation of a cyber attack on a computer system to...

What is Phishing?