Have New Backdoors Been Discovered in iOS? An Interview With iOS Developer and Digital Forensics Expert Jonathan Zdziarski

When the HOPE X (Hackers On Planet Earth) 2014 convention started on July 18th, one particular presentation caught the undivided attention of information sec

What you must know about OS fingerprinting

For those of us in the information technology field, there are two reasons why we should understand operating system fingerprinting. The first reason is t

Windows 7 Security Features

Windows 7 is an Operating System developed and released by Microsoft in 2009. It was designed to be a successor to the Windows Vista range of operating syste

Common Linux Misconfigurations

Over the numerous configuration reviews and pentest engagements that we have performed for our clients, we’ve observed a common pattern in the configuration

Windows 7 Exploitation

Microsoft Windows 7 is much more secure than Microsoft Windows XP. The Windows XP operating system has lots of OS vulnerabilities and the malware infection r

WSUS (Windows Server Update Services)

Introduction Windows Server Update Services (WSUS) can be used to manage the deployment of the latest Microsoft Windows operating system updates. When usi

Linux Hardening

This article aims to provide a general list of security issues that should be considered when you are auditing a Linux system or when you are hardening an ex

Introduction to Blackberry Balance Technology

Blackberry is known for its email and security rather than a company which produces fancy mobile phones. This is one of the reasons why Blackberry is preferr

Linux TPM encryption: Enabling TPM in BIOS and Kernel

The TPM stands for the Trusted Platform Module, which is a secure microprocessor that can store cryptographic keys that are further used to encrypt/decrypt d