How to secure your mobile phone and check for spyware?
Can a pen and paper really save you from a Cyber Incident?
BUGS Package updated to version 4.1.3
A Generic Incident Playbook
Log4j vulnerability information and 4x steps to prioritise
Programming and Cyber Security
The WhatsApp Privacy Question
Free Cyber Incident Playbooks on GitHub
HOW TO PROTECT AGAINST THE NEW PHISHING ATTACKS GETTING AROUND MFA (CONSENT PHISHING)
SOME CYBER INSURANCE CLAIMS IMPACTED BY COVID-19?
FREE CYBER SECURITY TESTING FOR SMALL BUSINESSES IN MAURITIUS
The problem with password expiry
Afer 17 years, a NEW BUGS Cryptography Package for Unix (version 4.1.2)
2019 CYBER SECURITY TRENDS REPORT OVERVIEW
PHISHING PROTECTION FRAMEWORK
NATIONAL CYBER SECURITY DRILL 2019
HOW TO CHOOSE MICROSOFT 365 SECURITY PLANS AND ADD-ONS: E3, E5, EMS E3, EMS E5, 365 E3, 365 E5
THE MAURITIUS SECURITY CLUB IS BACK!
ELYSIUMSECURITY LTD MAURITIUS IS ONE YEAR OLD!
New Download section with Presentations
FREE Cyber Security Event - 3rd Episode!
MU.SCL - Second Meeting for the Mauritius Cyber Security Club
MU.SCL - The Birth of a Cyber Security Club in Mauritius
FIRST Technical Colloquium 2017 in Mauritius - Our presentation on IDS
Today's Cyber Security Risk Context
GDPR and what it means to companies in the Indian Ocean and Africa
Are Cyber Security Challenges and Opportunities in Mauritius and Africa different from Europe?
When Business and Family priorities come together
Cyber Security Planning - A simple 6 Steps Approach
The 2015 SANS Holiday Hack Challenge Write-Up
How to build an efficient Anti-Phishing Framework?
How to build a Red Team and Why?
RANT FORUM - Red Team Recipes Presentation
IDS used as a Network Forensic Tool
IDS used as an Offensive Security Tool
Securing your Cloud Storage with a Boxcryptor alternative called EncFS
How to reduce WEB 2.0 attack surface by going back to WEB 1.0, the dynamic way!
Website update
SELKS 2.0 vs. Security Onion
BlackHat Mobile Security Summit - London 2015
Hackfu2015 Challenge 7 - Solution
Hackfu2015 Challenge 5 - Solution
Hackfu Challenge 2015 - Solution for Challenge 1
One more update to the Security Onion Guide
Updated Security Onion Guide
How to setup PIWIK to track visitors' downloads
How to setup Security Onion on a home network with Splunk, email alerts and some basic tuning
Fix for compiling VMwaretools 9.9.2 on kernel 3_18+
New Site Migration Complete
SANS Brochure Challenge Write-Up
BlackHat Europe 2014 – Some Highlights
iOS Backdoors
Critical Infrastructure and Cyber attacks
Heartbleed, do not panic!
Bluetooth under attack
Apple Security in the Enterprise
A new look
Using a phone as a keylogger, next it will be a smartwatch!
New iPhone 5S Fingerprint reader, a step in the right direction!
Mobile Device Management Limitations
The right (way) to disclose vulnerabilities
iOS7 and Mavericks Security
A story about Password: The Wrong Formula
Evernote hacked, an early warning for the Cloud Storage storm coming?
A new iOS 6.1 hack
Mobile devices security, history repeating itself: Harder, Faster, Stronger but not Better!
SANS 575: Mobile Device Ethical Hacking Review
Is there a bug with McAfee
Boxcryptor, a great tool to secure your cloud storage solution.
Security Onion and seeing through HTTPS
Is that the holy grail for critical systems?
Old tricks will always work…
Distributed Credential Protection
Wipe out/Factory Reset some Android’s phones
A Physical Solution to a Software Problem
MD5 Security Flaws
An interesting timeline representation of the CloudFlare’s hack
Flame and the DEB93D trail
Apple in Denial
Satellite phones encryption attacked
Windows 8 Picture Password, great but…
John Nash on Cryptography
Another iPhone hack, this time with a paperclip!
Bringing Your Own Device, a Security challenge.
Smile, you are being recorded!
Koobface, The dangerous game of naming and shaming
Most websites are vulnerable to a hash collision DOS attack
Encrypting DNS queries with DNSCrypt from OpenDNS
Twitter helping with Android’s Security
My take on SANS 660, The HexFactor and Netwars
Carrier IQ, an interesting story of deception or what we could call the Facebook syndrome
A job at GCHQ?
Next Generation Firewall
iOS 5 Vulnerabilities for iPad2 and iPhone 4S
I used to have one password…
An action on Data Privacy
Farewell Mr Jobs.
MOVA, ONLIVE, DIDO and a bit of magic (and maybe Aliens! ;)
New Dropbox Issues and a work around
Attack on Quantum Cryptography
Dropbox in the Enterprise
GPU Password Cracking
Worrying trends with Dropbox
Turning point for Apple Products Security
Free Forensic Resources
Extreme Pen Testing
Mobile device security questions
Hot Random Numbers!
SANS Ondemand Training course: A few Tips
An interesting attack on Voice Over IP Security
What could be the impact of the RSA breach
Time Square Video Screen Hack: A Nice hoax
Apple Security
What does SSD drives have to do with IPv6?
The rise of Memory Scrapping attacks and what it means to IRM, Disk Encryption and Thunderbolt
The inevitable rise of malware on mobile devices
Do what I say not what I do
The world of Computer Forensics
New iOS Security attack, this time it looks bad!
A Case Study, when Standard Security Certifications are not always your friend!
The increasing risk of 3G+ network within the corporate world
Follow-up on Apple iOS Full Disk Encryption
Apple and their elusive Full Disk Encryption solution
Full Disk Encryption Attacks
Cellular Network Attacks
Android vs iOS Security
The scary world of Social Media and geo tagging
PS3 Hacked and Cryptography
Interesting acquisitions
“Freemium” user procurement Strategy
Stuxnet, a Digital Worm with physical consequences (not to say political!)
Are you taking ZeuS wrath seriously?
IDC’s IT Security Conference 2010 – My take on it.
A funny case for not reusing passwords
Arcsight, another expensive acquisition… sorry, merger!
DoD Windows OS Security guides
An update on my XOR-Sum Uniqueness Cryptanalysis attack
Apple new Patent could mean Big Brother on your phone
New York Times Article on Russian Harcker’s Arrest
Intel set to acquire McAfee for £5 billion
Weekly Digest #3 – Interesting Articles
Weekly Digest #2 – Interesting Articles
Weekly Digest #1 – Interesting Articles
New Version of Truecrypt
Email working again
It was only yesterday…