Blog

Penetration Testing for PCI Compliance

What is PCI? Payment Card Industry Data Security Standard (PCI-DSS), or just PCI for short, is a set of security …

read more
Guide to Web Application Penetration Testing

Are you exposing your website and business to a security breach? A lot of businesses take security for granted. Just …

read more
Introduction to Mobile Application Penetration Testing

Are you looking for ways to secure your mobile environment and devices against skilled and deliberate hacker attacks? Hackers can and …

read more
Meeting Steve Wozniak

It was such a privilege and a thrill to have met Steve Wozniak, co-founder of Apple Computers. A true legend …

read more
Reject versus Drop – Which to use?

Packet filtering firewalls follow a methodology whereby they analyse the source, destination and port numbers of traffic as it arrives …

read more
Kali Linux – What’s new?

Kali Linux released earlier in the year is dubbed the most advanced penetration testing distribution, ever. How does it compare …

read more
Processing of PCAP files with Snort

PCAP files are something which security and network administrators analyse on a regular basis. But how often do you process …

read more