HackDig : Dig high-quality web security articles for hacker

The Complete Guide to IT Security Salaries in 2017

With 96% of HR managers now using IT certifications as screening or hiring criteria during recruitment, getting certified is an essential step in reaching your career goals. Depending on where you are in your career, there are a variety of certifications available to help you further your education and set yourself apart from other candidates.Before ex
Publish At:2017-10-25 06:20 | Read:2942 | Comments:0 | Tags:IT Certifications Meta

Computer Forensics Interview Questions

 Computer forensic investigators are in high-demand. Often referred to as digital forensics engineers, computer forensic investigators are expected to know basic IT skills, understand computer architecture and networking, have the ability to collaborate with various teams and write detailed reports. A digital forensics professional must have analy
Publish At:2017-10-22 04:37 | Read:1936 | Comments:0 | Tags:Forensics Interviews Meta

IT Auditor Interview Questions

 IT auditors are responsible for performing independent verifications of an organization’s security posture. These positions can have many name variations on job boards, including: information technology auditor, IT compliance analyst, internal auditor, CISA or business analyst.IT auditor positions exist in almost every industry, with salaries ran
Publish At:2017-10-22 04:36 | Read:1619 | Comments:0 | Tags:CISA IT Certifications Meta

Network+ Interview Questions

 The CompTIA Network+ is a vendor-neutral exam used to gauge an IT professional’s knowledge about installing, configuring and managing network infrastructure. Obtaining a Network+ certification can open up a path to numerous job types, including:Systems administratorInformation technology managerNetwork administratorNetwork engineerInformation tec
Publish At:2017-10-22 04:36 | Read:2330 | Comments:0 | Tags:IT Certifications Meta

Top 25 Security+ Interview Questions

The CompTIA Security+ certification is a good entry-level certification for infosec professionals. Many jobs, including Department of Defense positions, require the Security+ certification. Below are examples of the technical questions you may be asked as a certified Security+ professional. What is the difference between a public key cryptography and a
Publish At:2017-10-22 04:35 | Read:2276 | Comments:0 | Tags:Cryptography Interviews IT Certifications Meta

SecurityIQ Phish Reporter Documentation

How To Install & Use Phish ReporterThe Phish Reporter add-in for Microsoft Outlook, Outlook 365 and Gmail gives end-users the ability to report suspicious emails. Phish Reporter allows your employees to take an active role in managing the problem of Phishing & other types of malicious emails.  This will provide your SOC or Incident Response tea
Publish At:2016-09-16 17:30 | Read:5490 | Comments:0 | Tags:Meta

Hacker Handle Bounty

It’s time to close this chapter of our industry’s past. To distance ourselves from the World Wrestling Federation and comic book superheroes. We’re talking about hacker handles: Dildog, Thomas Dullien, Matt Blaze etc. When the Internet was young and fancy-free, hacker handles had their place. They afforded anonymity and supported the curious to explore the
Publish At:2016-04-01 11:25 | Read:6314 | Comments:0 | Tags:Meta

2015 In Review

Now that the new year is upon us, we can look back and take assessment of 2015. The past year saw Trail of Bits continuing our prior work, such as automated vulnerability discovery and remediation, and branching out into new areas, like secure self-hosted video chat. We also increased our community outreach: we advocated against reactionary regulation, suppo
Publish At:2016-01-07 23:55 | Read:2716 | Comments:0 | Tags:Meta

InfoSec Year-End Highlights

Oh Year 2015, your end is nigh. Let us pause for a moment and grab some information security highlights for these past weeks before we end this great year. This article will not tackle all of the information security highlights we have for the year 2015 but only recent news and updates.Last Weekly Metasploit Wrap-up of the YearJames “egypt”
Publish At:2015-12-28 19:35 | Read:4151 | Comments:0 | Tags:Meta

How We Fared in the Cyber Grand Challenge

The Cyber Grand Challenge qualifying event was held on June 3rd, at exactly noon Eastern time. At that instant, our Cyber Reasoning System (CRS) was given 131 purposely built insecure programs. During the following 24 hour period, our CRS was able to identify vulnerabilities in 65 of those programs and rewrite 94 of them to eliminate bugs built in their code
Publish At:2015-07-15 14:25 | Read:4468 | Comments:0 | Tags:Exploits Meta Program Analysis Vulnerabilities

How to Harden Your Google Apps

Never let a good incident go to waste. Today, we’re using the OPM incident as an excuse to share with you our top recommendations for shoring up the security of your Google Apps for Work account. More than 5 million companies rely on Google Apps to run their critical business functions, like email, document storage, calendaring, and chat. As a resu
Publish At:2015-07-07 17:35 | Read:4773 | Comments:0 | Tags:Attacks Education Meta

Gh0st RAT: Complete Malware Analysis – Part 1

In this article series, we will learn about one of the most predominant malware, named Gh0st RAT, whose source code is dated back to 2001 but it is still relevant today. In this article series, we will learn what exactly is Gh0st RAT, all its variants, how it works, its characteristics, etc.What is Gh0st RAT?Gh0st RAT (Remote Access Terminal) is a trojan 
Publish At:2015-02-11 15:30 | Read:3168 | Comments:0 | Tags:Malware Analysis Meta feature malware analysis

Now Offering Incident Response Training!

The InfoSec Institute is now offering a hands-on Incident Response training. This class covers the essential information you need to know in order to properly detect, contain and mitigate security incidents. Security incidents are a way of life in the modern world, and how organizations respond to them makes a massive difference in how much damage is ultimat
Publish At:2015-01-19 19:30 | Read:2230 | Comments:0 | Tags:IT Certifications Meta

The Foundation of 2015: 2014 in Review

We need to do more to protect ourselves. 2014 overflowed with front-page proof: Apple, Target, JPMorgan Chase. Et cetera. Et cetera. The current, vulnerable status quo begs for radical change, an influx of talented people, and substantially better tools. As we look ahead to driving that change in 2015, we’re proud to highlight a selection of our 2014 accompl
Publish At:2015-01-05 12:15 | Read:3464 | Comments:0 | Tags:Conferences Meta

Protecting the Smart Grid from Cyber Threats

In October 2008, an assassination attempt against exiled former Pakistani Prime Minister Benazir Bhutto was carried out by al-Qaeda operatives in the form of a roadside bombing of her caravan. The first sign that an attack was about to occur, according to witnesses, was the sudden switching off of public streetlights along the roadway. That attack claimed th
Publish At:2014-10-16 20:50 | Read:6457 | Comments:0 | Tags:General Security Meta feature general security

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud