End-Of Life Software

All software goes through a support cycle, starting at mainstream support, extended support and finally “End of Life”. When software is in mainstream support, provider regularly releases features and provides security updates for any bugs that are present. This support usually occurs when the software is first released and continues for the longest duration. In[…]

Bug Bounty

Open-Source Penetration Testing

With the enormous rise in Cyber Security threats online, many companies are at threat of their online databases being targeted and breached or are even susceptible to attackers defacing their website or using it to compromise visitors’ devices by using the website as a platform to deploy malicious software. This increase in online threats has[…]

hacker

Pharming attacks

Pharming is essentially a phishing scam that can infect numerous users simultaneous by redirecting them from a legitimate website to a fake site. The fake website can be used to install virus’s or trojans on the user’s computer to obtain personal information such as bank account details which could be utilised for identity theft. Pharming[…]