When you do a security assessment, you need to elaborate some recommendations to mitigate the potential risks. This is one of the most difficult parts,
Kubuntu and mostly ubuntu installations comes with a very basic installer, and does not allow you to personalize the encryption, by example, if you have windows
Many organizations fail to hire an ideal pentester, maybe because there are not enough candidates, maybe because they are too expensive, and they end up
In a recent article, John McAfee described computer forensic as a fallacy, and it’s true… here is why…
Unfortunately, TLS has been plagued by several vulnerabilities in recent years, making every HTTPS connection potentially unsafe. In this article I’ll show you how to
Detox Fedora 19/20/21
I’ve always used Fedora, basically since it was RedHat 7.0 … However, from that time until now, it has changed a lot.
Since several years, we have faced a “transparency campaign” on cryptography. That means that the cipher announces itself as an “encrypted container”. This suppose a
Linux have a set of many nice applications that could fit and run on your android device. You can install ubuntu trusty on your android
Penetration testing and vulnerability assesment is a practice that every day becomes more important to our businesses. Today we need to make security stress tests
Android is weak by nature… If you want to keep your android secured, you should take a lot of considerations. Every day, the software is