Introduction Last week I set out to create a visual dashboard of Coronavirus statistics. I wanted to create a simple dashboard where a user can…
As an Information Security (infosec) practitioner, one of the most common questions I get asked is “How do I know if I was hacked?” Well,…
While installing free software from the Internet users can be in the risk of installing potentially harmful software on their systems. With the use of…
Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
The world is currently experiencing a global misfortune in the form of the COVID-19 outbreak. Many countries have already gone into lock-down and self-isolation seems…
Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
What is Ransomware? Ransomware is malicious software that denies a user access to his or her files and demands a ransom in order for the…
Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
Welcome to this week’s newsletter. The curated information comes from books, podcasts, articles and documentaries. Think of this newsletter as content curation as a service.
Metasploitable3 is a free virtual machine that allows you to simulate cyber attacks in a safe environment. It is developed by Rapid7. You can use…