Sponsored by Keepnet Labs

How to ...?

Mark Simos Resource List

Mark Simos , a Chief Security Advisor at Microsoft and a great frined of mine recently shared a very useful resource list which I want to re share with you . Enjoy! Recent Updates Added CDOC blog link for "Zen and the Art of Threat Hunting" Fixed some broken links Incident Response and Recovery IR Reference Guide - Lessons learned and recommendations from [...]


Disabling the Mail app embedded in Windows 10?

I keep getting questions like : "I am using Microsoft Outlook or Office 365 as my default app. Bu still when I get a pop-up notice of newly arrived mail, if I click it, Windows 10 opens the pre-installed Mail app instead of Outlook. How can I disable it " (more…)


Creating a Vulnerability Management Strategy

Often, an exploitation of a vulnerability might lead to a disaster recovery scenario. Therefore, it is imperative to have a system in place that can prevent the vulnerabilities from being exploited in the first place. But how can you prevent a vulnerability from being exploited if you don’t know whether your system is vulnerable? The answer is to have [...]


Misleading VMWare Errors and the solutions

Did you recently install WMware Workstation and started to get wired error messages? Then hopefully this short blog post can help you Error 1 " VMware Workstation and Device/Credential Guard are not compatible. VMware Workstation can be run after disabling Device/Credential Guard" You have just installed VMWare and ready to kick it off, but hey, VMWare Workstation / Pro [...]


Information Gathering Methods

Information gathering is not as challenging as it used to be a few years ago when one would only get details about a target either directly from the target or from asking around. The internet, more specifically the use of social media, has simplified this stage with newer and faster techniques of data collection. In the process of data [...]


Social Engineering 101

What is Social Engineering Social Engineering is, involving clever manipulation of the natural human tendencies of trust to obtain information to help facilitate fraud, network intrusion, industrial espionage, and identity theft or network/system disruption. I do like also the definition from Bruce Schneier: “Amateurs Hack Systems, Professional hack People” To gain the trust of the people Social Engineers trick [...]


Apple and Privacy

Does really Apple cares about your privacy, as they advertise heavily or is this what they want us to believe? Compared to Google and Facebook they are by far better in terms of privacy as of today! But are they really angels? Or do they still collect lots of information by default and if they do, what can you [...]


How Hackers Get your Password?

It’s not a secret anymore, Hackers know our passwords.  551,509,767 real-world passwords previously exposed in data breaches. Are you one of those victims? Has your email been compromised or found in a data breach so far? How do hackers get your passwords? In this article, I am going to write the common methods which hackers use to steal your [...]


Netstat for Security Professionals

This article was originally posted in 2012, right after my Microsoft TechEd New Zealand session, Updates on screenshots This article is all about NETSTAT command. How it can help you to check the details on your network connections… (Network Statistics). It's used to display very detailed information about how your computer is communicating with other computers or network [...]