Stay Ahead of the Bad Guys!
The best defense comes from Ethical Hackers
Knowledge is Power!
Know how hackers hack. Start your live Cyber Security Awareness Training now!
Finding the shortest path to the solution.
Consultancy, Solution Design, Planning, Implementing and Optimization, we do all these buzz words!
WHY we do security...
we believe in providing the protection people deserve from incidents they can prevent.
- Ethical Hacking
- Risk Assessments
- Remediation Planning
- Spear Phishing Simulation
- Live User Awareness Training
Open Source Intelligence
- Track an individual
- Organization Reconnaissance
- Unmask Predators
- Combat Cyber Bullying/Stalkers
- Live Training: OSINT Basics
- Prevent identity theft
- Become invisible to stalkers
- Reputation Management
- Clean up negative search results
- Live Training: Practical Privacy
LATEST Blog articles
A wide array of random tech articles, tips, shortcuts, configurations, troubleshooting, etc ....
The effective career enhancement checklist of honest & blunt advice
A Mac Operating System has plenty of useful applications built right into it (like telnet, ssh, tftp, ftp) but depending on your use, the list below could really add value especially if you’re into privacy and security. Security (Anti-virus/Malware) Myth: Macs don’t require an antivirus. Truth: Most viruses are created to target the bulk of […]
Defacement A website is the front door and the face of your organization. Many hackers deface an organization by hacking their website and posting their message on it. (some well known victims: MIT, NASA, eBay, PayPal, Mossad, Forbes, WikiLeaks, Oracle, Russia Today) DDoS Attackers often use a Distributed Denial of Service attack to overwhelm a […]
The enemies of today are well equipped with the latest tools and techniques, knowledge on vulnerabilities and zero day attacks. On the flip side, most companies and individuals are not. Reasons for Lapse in Security Most organizations don’t take security seriously until they get affected. They do not see tangible results It is not their […]
First and foremost, this is an awesome domain name!!! Whois shows it was registered in 1997! But I’m sidetracking. This is CloudFlares privacy focussed DNS service. DNS recap: Just like your phone book translates names into phone numbers, DNS translates URLs (like google.com) to it’s actual IP address (like 22.214.171.124) which no one has the […]
What is GDPR? GDPR (General Data Protection Regulation) is the new EU regulation around data privacy. It primarily highlights that their citizens data should be fully in the control of the citizen and with complete transparency on how it’s used. In a nutshell, the exact opposite of what happens with user data in the US. […]
Software vendors are going to kill me for saying this, but you don't have to break the bank with software costs. There are FREE alternatives. Vendors may debate over which are better. But that decision has to be made on a per software basis and per use-case. As long as you have good support, Open […]
Gone are the days when you only needed to remember 3-5 passwords. Passwords were primarily for email accounts and a handful of social media and maybe an online bank account. Now you need at least 10 accounts for literally everything, from emails, eCommerce sites, social media, cloud apps, your thermostat, all your gov sites. You […]
Death does not come to anyone by asking. It is always sudden and people never expect it. Our lives are heavily intertwined in the digital world. As such, when (not if) that happens we should be prepared from a Cyber perspective. We have hundreds of online credentials that our lives depend on. It would make the […]
Name: Wanna Cry a.k.a Wanna Crypt Type: Worm, Ransomware Target: Windows Computers running SMB file sharing Original Creators: NSA (Yes, the US gov.) EternalBlue is the exploit that was developed by the NSA most likely to be used on “we the people”. It was leaked by hackers in April 2017 and used in the WannaCry ransomware […]