This Website Contains Information On IT Security Inclusive Are Standards/Policies/Procedures/Advisories/Exploits/Vulns/Countermeasures/
reverse engineering/Privacy Etc., , Risk Analysis & Governance Spanning Multiple Industries, And Finally Research Papers Written By Myself or others On A Multitude Of Subjects.. Enter a search and you shall find almost any topic on security.
Thank you for taking the time out to read this site as it is my way of giving back to the IT security community and public at large. Its primary goal is to inform the IT Security community and the general public about IT Security Advisories, Education in This Area and Countermeasures To Protect Critical Data From Being Exploited by Attackers. Remember be proactive as opposed to just being reactive!
Multiple LinkedIn accounts recently targeted numerous security specialists in an attempt to map their social graphs. Several of our researchers received these LinkedIn invitations themselves and Daavid from our Threat Intelligence team decided to investigate.
Here’s an example of one so-called “recruiter” account.