Top

2017
24 Aug

[pdfviewer width=”600px” height=”849px” beta=”true/false”]https://www.naushad.co.uk/pdf/library/EUR_0616_ezine_19pp.pdf[/pdfviewer]

21 Aug

[pdfviewer width=”600px” height=”849px” beta=”true/false”]https://www.naushad.co.uk/pdf/library/CCISO-Table-of-Contents.pdf[/pdfviewer]

29 May

Nmap is a great tool for discovering the network services and ports that your server is exposing to the network. In this guide, we will discuss some basic information, network scanning and advanced techniques covers how to use one of[…]

28 May

The recent WannaCry ransomware attack not only affected computers and billboards but actually impacted human life on a mass scale as hundreds of operations had to be delayed or cancelled. Organisations continue to suffer from external and internal attacks yet[…]

28 May

Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either “sophisticated attackers” or, more blatantly, naming and blaming nation-states like Russia, China and now North Korea (alright, maybe even Iran). The[…]

16 Apr

In particular, one thing that perfectly ties Snowden’s latest documents with this toolkit is a note of tracking an exploit through a 16-character string (ace02468bdf13579) which happens to be found in the code of one exploit from the collection, called[…]

2 Mar

Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How[…]

30 Jan

Research Interests: Computer and Network Security, Authentication protocols and Cryptography, VoIP Security and QoS, Secure protocol(s) implementation and testing for real-time traffic, Trust and security issues in Cloud environments.

8 Jan

London overground, critical infrastructure displaying information that opens up your attack surface. MAC address spoofing to name just one – Geeks who understand computer networks and IPs.