Yearly Archives: 2015
December 18, 2015 | by Alissa Abaskanova | Blog posts
The recent news are full of toys that’s use wireless connections having vulnerabilities and being at risk of being hacked.

Take for example Vtech’s tablets and Hello Barbie toys. And that’s just the beginning… Black hat hackers know which buttons are easiest to push.
Read more
December 16, 2015 | by Alissa Abaskanova | Blog posts

SANTA CLARA, California, Wednesday, December 16, 2015
eLearnSecurity, a provider of practical IT Security training courses, today announced their partnership with Lares Consulting, a leading IT Security Consulting firm in North America.
Lares Consulting’s customer base requires IT security training to increase the internal skillset on offensive and defensive security.
Tags: Cyber Security, eLearnSecurity, IT Security, IT security consulting, IT security training courses, Lares Consulting, partnership, penetration testing
Read more
December 10, 2015 | by Alissa Abaskanova | Blog posts

Pick any 4 of our online IT Security training courses in the Elite Edition at a flat fee!
Christmas is coming. Our gift this December 2015 is the opportunity to bundle any 4 out of our online IT Security training courses in the Elite Edition while saving up to $2000 on fees.
Tags: Christmas, Christmas Bundle, Cyber Security, December 2015, Elite Edition, elite penetration tester, Information Security Training Courses, IT Security, IT security training courses, Online Courses, Online IT Security training, penetration testing, Practical IT Security training courseourse, X-Mas
Read more
November 25, 2015 | by Edcel Suyo | Blog posts

If you're an IT professional tasked to maintain your company's website, it is important to constantly check the page for any vulnerabilities. Security researcher, Giuseppe Trotta, shares tools and tips to monitor if your website has been hacked.
Tags: security check, web application security, web applications
Read more
November 17, 2015 | by Edcel Suyo | Blog posts

Good news for all Students of our Penetration Testing Professional version 3 – PTPv3 training course. Our team of IT Security researchers just activated 10 additional virtual labs! You can now practice even more challenging scenarios covering network security and web application security.
Tags: Domain Admin, Hera lab, ICMP redirect, network security, penetration testing, penetration testing professional, PTPv3, virtual labs, web application security, xss
Read more
November 11, 2015 | by Edcel Suyo | Blog posts

This November, develop your offensive and defensive skills in network security, web app security, mobile app security, and software reverse engineering. Enroll into any of our exciting online IT security training courses and you will be upgraded to the next better Edition at no additional cost!
Tags: ares, IT Security, IT security training courses, maspt, mobile application security, Network Defense, network security, penetration testing course, pnd, ptp, PTS, pwd, reverse engineering of software, wapt, waptx, web application security, web defense
Read more
November 10, 2015 | by GiRa | Blog posts

Should I Stay or Should I Go
Hi everyone,
On October 20th, we at eLearnSecurity presented a webinar titled: Sneaky Man in the Middle Attack Exposed.
We had a lot of people attending with many enthusiastic comments and interesting questions. Thanks to everyone who made it!
Read more
November 8, 2015 | by Edcel Suyo | Researches

The Top 5 Hackme’s for the month of October have been published. Top spot goes to Very basic SQL injection.
Hackme is a virtual space where application security experts and enthusiasts can learn hacking skills through various challenges. What makes hackme great is that when you activate a challenge, a new sandbox will be created.
Tags: hack.me, hackme, top 5 hackme
Read more
October 31, 2015 | by Edcel Suyo | Researches

Data breaches are a growing concern. This recent TalkTalk hack now adds to a long list of businesses involved in such cyber security incidents. How should companies react when they fall victims to cyber attacks? IT security researcher, Andrea Tarquini, shares tips
Tags: cyber attack, data breach, network security, tips, web application security
Read more
October 28, 2015 | by Edcel Suyo | Video

A Man in the Middle (MITM) attack is a type of attack where the hacker gets in the middle of a communication between the victim and the server/service.
Our rockstar IT security researcher, Davide “GiRa” Girardi, shows you how to launch an advanced Man in the Middle (MITM) attack even if the network is using static ARP tables or if dynamic ARP inspection is enabled.
Tags: ethical hacking, man-in-the-middle attack, MITM attack, network security, penetration testing, webinar
Read more