Top

Blog Style 3

August 24 2017

[pdfviewer width=”600px” height=”849px” beta=”true/false”]https://www.naushad.co.uk/pdf/library/EUR_0616_ezine_19pp.pdf[/pdfviewer]

August 21 2017

[pdfviewer width=”600px” height=”849px” beta=”true/false”]https://www.naushad.co.uk/pdf/library/CCISO-Table-of-Contents.pdf[/pdfviewer]

May 29 2017

Nmap is a great tool for discovering the network services and ports that your server is exposing to the network. In this guide, we will discuss some basic information, network scanning and advanced techniques covers how to use one of[…]

May 28 2017

The recent WannaCry ransomware attack not only affected computers and billboards but actually impacted human life on a mass scale as hundreds of operations had to be delayed or cancelled. Organisations continue to suffer from external and internal attacks yet[…]

May 28 2017

Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger on either “sophisticated attackers” or, more blatantly, naming and blaming nation-states like Russia, China and now North Korea (alright, maybe even Iran). The[…]

April 16 2017

In particular, one thing that perfectly ties Snowden’s latest documents with this toolkit is a note of tracking an exploit through a 16-character string (ace02468bdf13579) which happens to be found in the code of one exploit from the collection, called[…]

March 2 2017

Everyone knows two-factor authentication right? or do you just know how to use it? Something you know and something you own is a phrase we can all recite but very few actually understand two-factor authentication and its true benefits. How[…]

January 30 2017
Feedback

Research Interests: Computer and Network Security, Authentication protocols and Cryptography, VoIP Security and QoS, Secure protocol(s) implementation and testing for real-time traffic, Trust and security issues in Cloud environments.

January 8 2017

London overground, critical infrastructure displaying information that opens up your attack surface. MAC address spoofing to name just one – Geeks who understand computer networks and IPs.

1 2 3 4 5 12