Keynote at Sony R&D Conference

I am proud to announce that I am invited to deliver a Keynote, as Guest Speaker at the internal Sony Research and Development Conference this week, in the United Kingdom. As usual, I will be speaking all about CyberSecurity. Event Dates : 18-19 June , London...


Information Gathering Methods

Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of data [...]


Does Apple spy’s on your iPhone? Gartner / Microsoft Feedback

I am sure most of you read by now my article "Apple and Privacy ", for the ones who did not I highly recommend to read it,( here is the link ) below are some public feedback which I have received via LinkedIn from Gartner, Microsoft, Australian Government employees. I will also share some of the feedbacks which I [...]


CROWDSTRIKE GLOBAL THREAT REPORT 2019

Adversary Tradecraft and The Importance of Speed The 2019 CrowdStrike® Global Threat Report offers one of the industry’s most comprehensive reports on today’s top cyberthreats. It combines analysis from CrowdStrike Threat Intelligence, Falcon OverWatch™ managed hunting and the CrowdStrike Services incident response teamshighlighting the most significant events and trends in the past year. It combines CrowdStrike’s comprehensive global observations with real-world case studies to [...]


Social Engineering 101

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick [...]