Abstract: This paper looks at simple ways that can be adopted by anyone into their IT environment. Without a doubt, those ways greatly help Information Security personnel to strike the right chord between security and consumerism. Introduction: ...
One of the big challenges that most cyber commanders have, or for that matter anyone who is responsible for protecting cyber systems, is to make the connection between cyber operations and kinetic warfare. The virtual battlefield has many of the elements found in the ...
Since a long time, passwords have been the most popular way for authentication and proving identity. Some new biometric techniques have evolved recently and have proven great accuracy and security. However, they are not used except in very sensitive places due to their high ...
“Cyber Revolution”… a catchy expression we use these days! This type of “revolution” is conducted over the Internet using social networks, such as Facebook and Twitter, and this is the first time in history that people start a revolution against unfair and oppressive ...
This article will show you how to get started in performing penetration testing on cell phones to see if it can be compromised by accessing their data via Bluetooth (BT). This is an important part of penetration testing as many bad things can be done to someone’s phone without ...
SQL injection is probably the most dangerous known web attack. Sometimes it could lead to remote code execution that gives the hacker a full control of the system. In this article we will talk about SQL injection types. 1- Error based SQL injection : In ...
Clement Dupuis is a man that you can’t prevent yourself from respecting his thoughts and his principles. His principles and beliefs were one of the main reasons to launch our magazine, Security Kaizen Magazine. Two years ago, We started quoting one of his famous sayings in ...
1. What is rootkit? The rootkit is simply a programme that gives you a permanent access to the “root”, which is the highest privileged user in UNIX system. The rootkit can easily control the system or modify it on the fly to force it to hide the presence of a specific virus or ...
Can you introduce yourself to Security Kaizen readers? I have been the Executive Director for DRI International for the last five years. Prior to that, I was the Business Continuity Management Global Head for Marsh and prior to that I was the Operational Resilience ...
No one, not even Mark Zuckerberg the founder of Facebook, nor Jack Dorsey the founder of Twitter had imagined that one day their websites will help in a country’s revolution, take down a president or change a regime. Egypt’s well educated youth, whose sole dream ...