Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
DDoS: When Servers won't serve

DDoS Attacks: When Servers Won’t Serve

Cyber Resilient SMEs

Cyber Resilient SMEs

Career in Cyber Security

Cyber Security Education & Career

Safety Tips for Your Mobile Devices

Uday Mittal September 24, 2015 Leave a Comment

Safety Tips for Your Mobile Devices

That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]

Filed Under: Awareness Tagged With: Cyber Security, Mobile, Mobile Safety Tips, Mobile Security, Personal Information, Wifi

Updated: Comments on Draft National Encryption Policy

Uday Mittal September 22, 2015 Leave a Comment

Updated: Comments on Draft National Encryption Policy

Imagine, the Government issues a policy which states that you may lock your house but you have to leave the keys outside the house, at all times. The Government appointed officials may then at any time visit your house to see what’s going on inside. You have no choice but to comply. What would your […]

Filed Under: Awareness Tagged With: Cyber Security, Government of India, National Encryption Policy, privacy

Cyber Security Awareness 2.0

Uday Mittal September 21, 2015 2 Comments

Cyber Security Awareness 2.0

When dealing with Cyber Security, it is often said that people are the weakest links. One vulnerable and gullible employee is all it takes to infiltrate into the company network. However, cyber security managers need to ask themselves this question, are people really the problem here? The challenge for cyber security managers is that they […]

Filed Under: Awareness Tagged With: awareness, Cyber Security, facebook, Social Media, twitter, youtube

YCSC QnA with Keith Pradeep Fernandez

Uday Mittal September 16, 2015 Leave a Comment

YCSC QnA with Keith Pradeep Fernandez

About Keith Pradeep Fernandez Keith, CIPP/IT, CISSP, CISA, CISP, is a seasoned Security and Privacy Professional with a rich experience of over 15+ years in various geographies (US, Australia, Middle East, India) and industries like IT Consulting, Internet and telecom Service Providers and software development firms including a fortune 500 client. He is currently working as […]

Filed Under: YCSC QnA Tagged With: CISSP, Cyber Security, Interview, Security and privacy professional

Online Safety Tips for Golden Agers

Uday Mittal September 14, 2015 Leave a Comment

Online Safety Tips for Golden Agers

Recently, I came across a question on Quora wherein a gentleman, claiming to be 80 years of age, had asked for some advice on how to learn server side languages. In fact, he aimed to beat Mark Zuckerberg and Jack Dorsy before he departs for good. Frankly, I was a bit surprised by this because I […]

Filed Under: Awareness Tagged With: Golden Agers, Older Adults, Online Safety, Online Safety Tips, Senior Citizens

The Library Freedom Project

Uday Mittal September 13, 2015 Leave a Comment

The Library Freedom Project

The other day I was researching a topic which was somewhat controversial in nature. My search for more information took me to the local library. I asked the librarian about the section where I could find books on that topic. First he gave me a suspicious look and then directed me towards a computer through […]

Filed Under: Awareness Tagged With: Alison Macrina, Digital Privacy, Free Software Foundation, Library Freedom Project, Tor

Information Security: Proper Heads for the Hats

Rohan Parakh September 9, 2015 Leave a Comment

Information Security: Proper Heads for the Hats

Last 10 years saw India becoming one of the biggest pool of skilled IT professionals. While this has largely been into IT services sector (software & infrastructure primarily), Indian profiles in world’s biggest product companies is not something unheard of. And while world looks at Social, Mobile, Analytics and Cloud (SMAC) as the next big […]

Filed Under: Skills Development Tagged With: career, Certification, consultants, Information Security, professionals

Let there be no more MMS Scandals

Uday Mittal August 31, 2015 Leave a Comment

Let there be no more MMS Scandals

MMS. What was the first thing that came to your mind after reading MMS? More often than not it’s sex scandals. Like Google has become a synonymous for search, MMS has become a synonymous for unauthorized capture and/or release of a video clip containing intimate acts, usually sexual in nature, aka Sex Scandals. It’s not only illegal, […]

Filed Under: Awareness Tagged With: awareness, MMS Scandals, technology hygiene

CSX Fundamentals: Everything You Need to Know

Uday Mittal August 26, 2015 7 Comments

CSX Fundamentals: Everything You Need to Know

Last year, ISACA launched a new series of certifications, focused on Cyber Security, called CyberSecurity Nexus (CSX) Certifications. This series contains a total of eight certifications leading to either CSX Expert or CISM. Image Source: Isaca.org CSX Fundamentals is the first certification in this series. I started my certification path with it and would like to […]

Filed Under: Upcoming Certifications Tagged With: CSX, CSX Fundamentals, Cyber Security, ISACA

Social-Engineer Toolkit: An Introduction

Spandan Chowdhury August 22, 2015 Leave a Comment

Social-Engineer Toolkit: An Introduction

Long back, I read a book called The Art of Intrusion by Kevin Mitnick, in which he explained some of his successful techniques to infiltrate into an organization’s network. Among them was one that he employed the most, Social Engineering. Social Engineering can be defined as a psychological play on people in order to lead them […]

Filed Under: Under the Hood Tagged With: Kali Linux, Penetration Testing, SET, Social Engineering, Social-Engineer Toolkit

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • Next Page »

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Red Team Operations Attack Lifecycle
    Red Team Operations Attack Lifecycle
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • AD Exploitation using ADSI - Part 1 (Introduction)
    AD Exploitation using ADSI - Part 1 (Introduction)
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress