Having a strong password actually can prevent most attacks.

Just because a device is new does not mean it’s safe.

Even the very best software has security vulnerabilities.

Every website and app should use HTTPS.

The cloud is not safe — it just creates new security problems.

Software updates are crucial for your protection.

computer security company

The latest information in security news, research, hacker techniques and vulnerabilities.

computer company philadelphia

RSS Dark Reading:

Data Security Services Philadelphia PA

RSS Kali Linux

  • Kali Linux 2019.3 Release September 2, 2019
    We are pleased to announce that our third release of 2019, Kali Linux 2019.3, is available immediately for download. This release brings our kernel up to version 5.2.9, and includes various new features across the board with NetHunter, ARM and packages (plus the normal bugs fixes and updates).​ As promised in our roadmap blog post, […]
  • Major Metapackage Makeover August 22, 2019
    With our 2019.3 Kali release imminent, we wanted to take a quick moment to discuss one of our more significant upcoming changes: our selection of metapackages. These alterations are designed to optimize Kali, reduce ISO size, and better organize metapackages as we continue to grow. Before we get into what’s new, let’s briefly recap what […]
  • Kali NetHunter App Store – Public Beta July 15, 2019
    Kali NetHunter has been undergoing a ton of changes as of late. Now supporting over 50 devices and running on Android devices from KitKat (v4.4) to Pie (v9.0), its amazing the extra capabilities that have been introduced. But, we don’t want to stop there. After a ton of work, we are really excited to introduce […]
Data Security Services Philadelphia PA

RSS Security Weekly

  • Investigating Phishing Emails and Domains Using DomainTools Iris September 27, 2019
    This blog post is sponsored by DomainTools. For more information and product trials please visit Investigation Time! You may be sitting at work early in the morning, enjoying your coffee and the peace and quiet that comes along with being the first one in the office. Like most, the first thing you do is […]
  • Thwarting the Insider Threat with Network Traffic Analysis May 23, 2019
    For decades, anyone analyzing network traffic concentrated on external network traffic, known as north-south traffic, through the perimeter via firewalls.  Although firewalls evolved to better analyze this traffic, two primary trends emerged: 1) cloud adoption was causing the perimeter to become more porous, even to the point of extinction, and 2) as attackers gained sophistication, […]
  • Domain Investigations Using Open-Source Tools And DomainTools Iris May 2, 2019
    This blog post is sponsored by DomainTools. For more information and product trials please visit  Malicious or Not? The above question runs through the brains of SOC analysts across the world multiple times per day. When you are analyzing security events looking for the “bad” things, you often come across a domain that requires […]
error: Content is protected !!