Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Cyber Resilient SMEs

Cyber Resilient SMEs

Cybersecurity Canon Project

The Cybersecurity Canon Project

Career in Cyber Security

Cyber Security Education & Career

Will Bitcoin Rule The Free World?

Uday Mittal June 29, 2015 Leave a Comment

Will Bitcoin Rule The Free World?

Every once in a while, a new idea is born—one that has the potential to question the very foundations of everything we know about the world as it is today. The ideas I am talking about are those that have changed and will change the world for the better. Take email, for example—at its inception, […]

Filed Under: Under the Hood Tagged With: Bitcoin, bitcoin mining, crypto-currency, Satoshi Nakamoto

CISSP: Everything You Need to Know

Uday Mittal June 28, 2015 1 Comment

CISSP: Everything You Need to Know

I had been waiting for this moment since past few months and it happened yesterday, I passed the CISSP Certification exam in first attempt. Yay! Before I write further, I would like to thank my ex-colleagues and friends who guided me and patiently answered my endless barrage of questions regarding the certification process. Given the value […]

Filed Under: Essential Certifications Tagged With: (ISC)2, Certification, CISSP, Eric Conard, Information Security, Shon Harris

Good Read: The Snowden Files

Uday Mittal June 26, 2015 Leave a Comment

Good Read: The Snowden Files

When I first heard about the PRISM mass surveillance program, conducted by the United States National Security Agency (NSA), I thought it was an hoax. Primarily, because up until then that kind of stuff belonged to Hollywood movies only, at least for the uninformed me. But as the news snowballed and caught the attention of […]

Filed Under: Good Reads, Non-Fiction Tagged With: Edward Snowden, Luke Harding, Mass Surveillance, The Snowden Files

A Movie on Privacy: Enemy of the State (1998)

Uday Mittal June 25, 2015 Leave a Comment

A Movie on Privacy: Enemy of the State (1998)

Recently, I read an article about how government surveillance has evolved over the years and how the adoption of new technologies and services is aiding it. An interesting point to note was the striking similarity between the government’s version and the ‘tracking‘ done by the private firms for ‘analytical purposes‘ to ‘improve their services‘. While […]

Filed Under: Recommended Motion Pictures Tagged With: Enemy of the state, privacy

Social Media: Better Be Safe Than Sorry

Uday Mittal June 24, 2015 Leave a Comment

Social Media: Better Be Safe Than Sorry

I still remember the time when I first learnt about the concept of Social Media. It was through Orkut (R.I.P.), the not so successful attempt of Google Inc. to enter into this market. Even though in the larger scheme of things it didn’t fare well but at the time it was the rage. With time […]

Filed Under: Awareness Tagged With: Self-worth, Social Media

Uday Mittal June 23, 2015 1 Comment

Secure Your Wifi Connection: Why & How?

If you’ve been on the internet for a while you would have come across one of those Memes highlighting the importance Wifi in our lives. If not do a quick Google search, get a cup of coffee and have a blast! Thanks to our 24 x 7 companions, smartphones, tablets and laptops, Wifi has almost […]

Filed Under: Awareness

  • « Previous Page
  • 1
  • …
  • 7
  • 8
  • 9

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Mr. Robot: Fsociety deploys ransomware
    Mr. Robot: Fsociety deploys ransomware
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • SPN Scanning using ADSI (Part 3)
    SPN Scanning using ADSI (Part 3)
  • Book Review: Penetration Testing Azure for Ethical Hackers
    Book Review: Penetration Testing Azure for Ethical Hackers

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress