Cyber Crime

Cyber Crime | News, how-tos, features, reviews, and videos


template c100.00 06 55 04.still001
video

What is a phishing kit? Watch this in-depth explainer | Salted Hash Ep 39

What is a phishing kit? In this video, Steve Ragan offers an answer and a look at some of the kits Salted Hash has collected.

template c100.00 03 35 22.still001
video

An introduction to Kit Hunter, a phishing kit detector | Salted Hash Ep 40

Kit Hunter, a basic Python script written by host Steve Ragan, searches on common tag elements to find hidden phishing kits on a web server.

salted hash thumbnail multi final
video

Phishing problems: 3.2M emails blocked in a month | Salted Hash Ep 37

Asaf Cidon, vice president of email security at Barracuda Networks, talks with host Steve Ragan about a recent uptick in phishing attacks, including a spike in business email compromise (BEC) attacks.

salted hash thumbnail multi final
video

The risks associated with global Internationalized Domain Names | Salted Hash Ep 36

Paul Vixie, CEO of Farsight Security, explains how global Internationalized Domain Names, or global IDNs, sparked the emergence of confusingly similar website addresses with nefarious goals -- and how to combat them.

salted hash thumbnail final
video

The difference between red team engagements and vulnerability assessments | Salted Hash Ep 34

In this episode, host Steve Ragan talks with Phil Grimes, Professional Services Lead at RedLegg, about the challenges of educating customers — and building a partnership with them — to create successful red team engagements.

template c100.00 06 00 09.still001
video

What an Apple phishing attack looks like | Salted Hash Ep 32

How can you tell the difference between a legitimate email and a phishing attack? Host Steve Ragan shows what an Apple phishing attack looks like, screen by screen, showing the difference between the real and the fake.

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

Get started with Angular

A step-by-step guide to installing the tools, creating an application, and getting up to speed with Angular components, directives, services, and routers

Python megaguide: The best frameworks and IDEs

Only on InfoWorld: A hands-on, in-depth look at 13 Python web frameworks and six Python development toolkits

Quick guide: Digital transformation and the agile enterprise

Enterprise transformation is hard. But when you build a platform for continuous change, putting new ideas into production becomes a lot easier

Career hacks: Professional do’s and don’ts for developers

The hot skills to master, the secrets to breaking into management, the career mistakes to avoid -- here's how to refactor yourself as the developer every organization wants

ifw dd office 365

Deep Dive how-to: Office 365 document sharing

Office 2016, OneDrive, and Office 365 together offer powerful document collaboration capabilities across Windows, MacOS, iOS, Android, and the web -- but only if you set them up and manage them properly. This how-to guide walks you...

Machine learning megaguide: Amazon, Microsoft, Databricks, Google, HPE, IBM

Download InfoWorld's massive roundup of Amazon, Microsoft, Databricks, Google, HPE, and IBM machine learning toolkits

The Essential Guide to Microservices

How to create modern Web and mobile applications that scale.

The essential guide to PowerShell for Windows, Windows Server, and Exchange

Make the most of Microsoft’s command line by mastering the nuances of the PowerShell language

Public cloud megaguide: Amazon, Microsoft, Google, IBM, and Joyent compared

The top five public clouds pile on the services and options, while adding unique twists

Monitoring in the age of devops

A combination of cultural transformation and automation is redefining the way developers and operations work together. But for devops to succeed, comprehensive, real-time monitoring must be in place

Special report: Extending the reach of enterprise developers

There's a quiet revolution taking place in the software development space, with a focus on learning, leadership, and communications

Load More
You Might Also Like