Yearly Archives: 2015
December 18, 2015 | by Alissa Abaskanova | Blog posts
The recent news are full of toys that’s use wireless connections having vulnerabilities and being at risk of being hacked.
Take for example Vtech’s tablets and Hello Barbie toys. And that’s just the beginning… Black hat hackers know which buttons are easiest to push.
December 16, 2015 | by Alissa Abaskanova | Blog posts
SANTA CLARA, California, Wednesday, December 16, 2015
eLearnSecurity, a provider of practical IT Security training courses, today announced their partnership with Lares Consulting, a leading IT Security Consulting firm in North America.
Lares Consulting’s customer base requires IT security training to increase the internal skillset on offensive and defensive security.
Tags: Cyber Security, eLearnSecurity, IT Security, IT security consulting, IT security training courses, Lares Consulting, partnership, penetration testing
December 10, 2015 | by Alissa Abaskanova | Blog posts
Pick any 4 of our online IT Security training courses in the Elite Edition at a flat fee!
Christmas is coming. Our gift this December 2015 is the opportunity to bundle any 4 out of our online IT Security training courses in the Elite Edition while saving up to $2000 on fees.
Tags: Christmas, Christmas Bundle, Cyber Security, December 2015, Elite Edition, elite penetration tester, Information Security Training Courses, IT Security, IT security training courses, Online Courses, Online IT Security training, penetration testing, Practical IT Security training courseourse, X-Mas
November 25, 2015 | by Edcel Suyo | Blog posts
If you're an IT professional tasked to maintain your company's website, it is important to constantly check the page for any vulnerabilities. Security researcher, Giuseppe Trotta, shares tools and tips to monitor if your website has been hacked.
Tags: security check, web application security, web applications
November 17, 2015 | by Edcel Suyo | Blog posts
Good news for all Students of our Penetration Testing Professional version 3 – PTPv3 training course. Our team of IT Security researchers just activated 10 additional virtual labs! You can now practice even more challenging scenarios covering network security and web application security.
Tags: Domain Admin, Hera lab, ICMP redirect, network security, penetration testing, penetration testing professional, PTPv3, virtual labs, web application security, xss
November 11, 2015 | by Edcel Suyo | Blog posts
This November, develop your offensive and defensive skills in network security, web app security, mobile app security, and software reverse engineering. Enroll into any of our exciting online IT security training courses and you will be upgraded to the next better Edition at no additional cost!
Tags: ares, IT Security, IT security training courses, maspt, mobile application security, Network Defense, network security, penetration testing course, pnd, ptp, PTS, pwd, reverse engineering of software, wapt, waptx, web application security, web defense
November 10, 2015 | by GiRa | Blog posts
Should I Stay or Should I Go
On October 20th, we at eLearnSecurity presented a webinar titled: Sneaky Man in the Middle Attack Exposed.
We had a lot of people attending with many enthusiastic comments and interesting questions. Thanks to everyone who made it!
November 8, 2015 | by Edcel Suyo | Researches
The Top 5 Hackme’s for the month of October have been published. Top spot goes to Very basic SQL injection.
Hackme is a virtual space where application security experts and enthusiasts can learn hacking skills through various challenges. What makes hackme great is that when you activate a challenge, a new sandbox will be created.
Tags: hack.me, hackme, top 5 hackme
October 31, 2015 | by Edcel Suyo | Researches
Data breaches are a growing concern. This recent TalkTalk hack now adds to a long list of businesses involved in such cyber security incidents. How should companies react when they fall victims to cyber attacks? IT security researcher, Andrea Tarquini, shares tips
Tags: cyber attack, data breach, network security, tips, web application security
October 28, 2015 | by Edcel Suyo | Video
A Man in the Middle (MITM) attack is a type of attack where the hacker gets in the middle of a communication between the victim and the server/service.
Our rockstar IT security researcher, Davide “GiRa” Girardi, shows you how to launch an advanced Man in the Middle (MITM) attack even if the network is using static ARP tables or if dynamic ARP inspection is enabled.
Tags: ethical hacking, man-in-the-middle attack, MITM attack, network security, penetration testing, webinar