File sharing involves using technology that allows internet users to share files that are housed on their individual computers. Peer-to-peer (P2P) applications, such as those used to share music files, are some of the most common forms of file-sharing technology. However, P2P applications introduce security risks that may put your information or your computer in…
Read more
Understanding Patches and Software Updates
Patches are software and operating system (OS) updates that address security vulnerabilities within a program or product. Software vendors may choose to release updates to fix performance bugs, as well as to provide enhanced security features. https://us-cert.cisa.gov/ncas/tips/ST04-006
Read more
CIS Controls Telework and Small Office Network Security Guide
Routers, modems, and other network devices act as the on-ramp for private networks to access the internet. Although these network devices are developed and marketed for home usage, they are often purchased by small to medium-sized organizations and used in a professional enterprise setting. Furthermore, the trend of teleworking is gaining momentum, and employers are…
Read more
Android Pentesting Lab – Step by Step guide for beginners
Introduction As a pentester developing new skills in different areas is very important as you might miss something crucial from one approach. Android pentesting is one of them, but it requires a dedicated environment and I will explain how to setup an easy one. https://medium.com/bugbountywriteup/android-pentesting-lab-4a6fe1a1d2e0
Read more