Somewhere along the way in delving in to cyber security, I’ve also gained an interest in encryption. While this might seem obvious, I’m more interested in the classical cryptography such a ...
I came across a product on Amazon today that I clicked on for entertainment because I assumed it was satirical but much to my dismay, it turned out to be 100% real. It’s a product called the , b ...
I thought I’d write a quick update guide on installing Kali Linux from USB as I’m hoping to encourage more friends to install an instance and start playing. This guide assumes you’re ...
IMPORTANT NOTE: At the time of writing, Metasploitable 2 has no synthetic drivers for Hyper-V and so cannot communicate with the server via a virtual switch, even using the drives from the Linux Integ ...
There’s a slight stir in the media of late about a vulnerability discovered in the Remote Desktop Services service on Microsoft Windows systems. It’s CVE reference is CVE-2019-0708 but is ...
I recently purchased a phone for my eldest, making the decision to stick with Android for the Google Family Link platform which allows me to lock down the device and monitor where it is (for safety an ...
Its with a (slightly) heavy heart I write this as I’m a fan boy of ‘s networking gear. For those that don’t know, put business-class networking firmly in the consumer price bracket. ...
Cisco announced patches last week for a vulnerabilities in two of their routers that are rated High and scored over 7 each on the CVSS. Which devices are affected? At present it appears that only two ...
As the cyber security journey continues, I’ve been inevitably caught in the net of ISO 27001. As one of the most globally accepted frameworks for information security, its inevitable that those ...
A company known to me, let’s call them AcmeIndustry.co.uk, was recently targeted by persistent spear-phishing attacks. Emails we’re being sent to staff which appeared to be from other memb ...