‘I’m going to ruin you, dear’

revenge porn

How would you feel if you casually opened a mail and found the link to a pornographic site — and it turned out to contain pictures of yourself naked? That’s what Kalpana did. She clicked on a link sent to her and, to her horror, found that the face of the girl who “was available for sex” was hers. Her stomach lurched when she saw that the pictures showed her own bedroom. The site also contained her personal and contact details.

Continue Reading.......

Teaching Students to Avoid Danger Online: Internet Safety Instructor Terry Cutler

internet safety expert Terry Cutler with digital locksmiths holding ipad

By Erin Flynn Jay

Terry Cutler on Internet Safety

Terry Cutler has heard a familiar refrain during nine years of teaching Internet safety: Parents can’t keep up with their kids when it comes to technology. The way he sees it, yesterday’s technology did not prepare today’s parents for their children’s ability to access potentially harmful media.

Continue Reading.......

Mastering Kali Linux for Advanced Penetration Testing – ISBN :1782163123

I had the honor and privilege to assist Robert Beggs as a technical reviewer for his book titled Mastering Kali Linux for Advanced Penetration Testing – ISBN :1782163123.
I endorse this book as the content is deep and insightful. A must have for your IT security library

A practical guide to testing your network’s security with Kali Linux – the preferred choice of penetration testers and hackers

Continue Reading.......

Should You Use a Password Manager?

poor-password-manager-shst

Many cybersecurity experts insist that using a password manager is the best way to make sure you have a strong, unique password for every online account. But others are less sure about the value these tools provide.

For naysayers, password managers represent a single point of failure — a treasure trove of highly sensitive information guarded by one master password that could itself be lost, stolen or hacked.

Continue Reading.......