APPACSM2017ISSUE2 | Hacking & Penetration Testing | Skills & Training | Strategy & Architecture | Vulnerabilities | August 10, 2017
Hacking your own company: Before the bad guys do it for youFor some of us who are familiar with the term ‘Hacker’, we understand the general public’s perception about what they’d…
APPACSM2017ISSUE2 | Contributors | Editor's Desk | Skills & Training | Vulnerabilities | August 10, 2017
A beginner’s guide to bug bounty programmesBug bounty programmes are a way of encouraging the security community to work together to identify and responsibly disclose security…
APPACSM2017ISSUE1 | Contributors | Editor's Desk | Hacking & Penetration Testing | Vulnerabilities | June 19, 2017
From student to pen testerMy journey into cybersecurity I was 17 and still in high school when I first discovered the computer hacking scene.…
Cyber threat landscape: What Australia can expect now and in the future
AISA NSW Chapter Meeting with Eugene Kaspersky – Chairman and CEO, Kaspersky Lab Presenting at AISA NSW Chapter’s May member…
EPS Processing Zero-Days Exploited by Multiple Threat Actors
In 2015, FireEye published details about two attacks exploiting vulnerabilities in Encapsulated PostScript (EPS) of Microsoft Office. One was a…