Category Security

Security eBooks –

Free Technology Ebooks from Packt Publishing.
Packt Publishing offers a free technology ebook a day. You can avail this here.
All you have to do is to visit that URL and claim you free book. Additionally after you add books in your account you can read it online, download PDF, EPUB and MOBI version and send to your Kindle.

In case you missed some of those cool ebooks, I have gathered some from my collection and will be updating regularly.

However this repository is exclusively for security folks and is a part of Hack with GitHub repositoryFree Security eBooks?

Free Security eBooks-2?
PacktPub – Free learning
PacktPub Mapt personal library

Read More

Auditing linux , unix OS..in 120 seconds flat

A script to audit linux and unix distributions based mainly on the CIS standards and universal linux hardening guidelines.

Nix Audit made easier (RHEL, CentOS)
Nix Auditor – GitHub

Also head over to CIS Secure Suite homepage for more greatness! Follow CIS Security on Youtube, Facebook and Twitter

https://www.cisecurity.org/

https://www.cisecurity.org/


CIS Secure Suite

Read More

OWTF 2.1a “Chicken Korma” released


OWASP OWTF

Yes folks, it is that time again, a new release of the Offensive Web Testing Framework, OWASP OWTF, one of several OWASP Flagship projects:
We find OWTF most useful in large assessment where you have little time to evaluate a large number of targets. The ability to launch plugins selectively and dynamically as well as removing work from the load, pause and resume, etc. makes OWTF shine where most other tools struggle ๐Ÿ™‚

Read More

Phishing with Unicode Domains

Phishing with Unicode Domains

The homograph protection mechanism in Chrome, Firefox, and Opera unfortunately fails if every characters is replaced with a similar character from a single foreign language. The domain “ะฐั€ั€ำะต.com”, registered as “xn--80ak6aa92e.com”, bypasses the filter by only using Cyrillic characters.


Read More

Information Systems Security Association


“Local chapters host periodic meetings, usually monthly, for educational and networking purposes. Events with broader scope are held at the regional, national and international levels.

ISSA members receive continuing education credits for attending all ISSA-sponsored activities, as well as activities sponsored by other organizations that uphold similar membership standards.

The following list includes some of the important ways that ISSA members work toward achieving the Association’s goals:

Organize international conferences, local chapter meetings and seminars that offer educational programs, training and valuable networking opportunities.
Provide access to information through the ISSA website as well as an online newsletter and monthly journal.
Offer support for professional certificat...

Read More

Ethical Hacking and Penetration Testing with Kali Linux Training Course

Ethical Hacking and Penetration Testing with Kali Linux Training Course

Read More

CCNA Cyber Ops Scholarships

CCNA Cyber Ops

To help close this security skills gap, Cisco is introducing the Global Cybersecurity Scholarship program. Cisco will invest $10 million in this program to increase the pool of talent with critical cybersecurity proficiency. Cisco also has enhanced its Security certification portfolio with a new CCNA Cyber Ops certification.

Read More

Hacker shows and movies on Netflix and Hulu!

The Hacker wars on Netflix The Hacker Wars (2014) IMDb
CSI: Cyber CSI: Cyber on Tv.com
CSI: Cyber on Hulu CSI: Cyber
Hulu Keyword “Hackers” Hulu Hacker shows and feeds

Read More

Secure Hash Algorithms

What is an SHA algorithm and how does it affect you? Google recently was able to crack (Collision attack) the SHA-1 algorithm making it an obsolete encryption algorithm.

SHA-1 was designed in 1995 by the National Security Agency (NSA) as a part of the Digital Signature Algorithm. Like other hashes, SHA-1 also converts any input message to a long string of numbers and letters that serve as a cryptographic fingerprint for that particular message.

Read the article here
Secure has algorithms
SHA-1
SHA-2

Read More

SHA1 collision – What’s it all about?

J4vv4D’s Channel

Read More