Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Hacking the Internet of Things: How Easy Is It?

Jen Martinson March 2, 2016 1 Comment

Hacking the Internet of Things: How Easy Is It?

One of the buzzword in the tech world these days is the Internet of Things and the idea behind it is that in near future all of our home appliances (among other things) will be connected to the internet and controlled by it. We will be able to set our toasters from our smartphones. Our […]

Filed Under: Awareness, Internet of Things Tagged With: hacker, Internet of Things, IoT Security, smartphone, Wifi

Safety Tips for Your Mobile Devices

Uday Mittal September 24, 2015 Leave a Comment

Safety Tips for Your Mobile Devices

That smartphone in your pocket – or your tablet or laptop – contains significant information about you and your friends and family – contact numbers, photos, location and more. Your mobile devices need to be protected. Take the following security precautions and enjoy the conveniences of technology with peace of mind while you are on […]

Filed Under: Awareness Tagged With: Cyber Security, Mobile, Mobile Safety Tips, Mobile Security, Personal Information, Wifi

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress