OWASP TOP 10 Internet of Things (IOT)1-Weak, Guessable, or Hardcoded Passwords Use of easily brute-forced, publicly available, or unchangeable credentials, including...
HTTPS Spoofing – How Phishing Websites Use HTTPS to Fool Mobile Users As a safeguard against the activities of fraudsters and malicious actors who engage in email phishing, social engineering scams,...
The Cyber Kill ChainThe term “kill chain” is a term used originally by the military to define the steps the enemy uses to attack a target. In 2011 Lockheed...