CyberSecurity, CyberDefense, Cyber Resilience

InfoSec, SecNews, AppSec, Best Practices, Project Ideas, Source Code, etc. || Dr. Grigorios Fragkos, follow: @drgfragkos

Friday, 11 March 2016

Building a Security Operations Centre (SOC)

›
Building a Security Operations Centre (SOC) is undoubtedly the best move you can make towards protecting not only your organisation’s dat...
Thursday, 10 March 2016

Format a memory card back to its original size (Raspberry Pi)

›
After using an SD card to install Kali Linux on Raspberry Pi, I decided I had to reformat it to its original size. If you try to do this u...
Tuesday, 8 March 2016

Raspberry Pi 2 Model B and Kali Linux 2.1 - quick setup

›
In order to install Kali Linux on Raspberry Pi, you will need to download the new image for Raspberry Pi 2 version 2.1 from https://www.of...
Tuesday, 1 March 2016

Decrypting RSA with Obsolete and Weakened eNcryption (DROWN)

›
An OpenSSL security hole enables Secure Sockets Layer (SSLv2) , to be used to attack modern web sites. Even though this is a  an ancie...
Wednesday, 24 February 2016

Teach your brain to regenerate passwords instead of remembering them

›
@TripwireInc posted a brief article about my talk for @AbertayHackers and #SecuriTayV happening this Friday 26/Feb. For those attending, ...
‹
›
Home
View web version

About Me

drgfragkos
View my complete profile
Powered by Blogger.