PeopleSec Blog


web app penetration testing

A Beginner’s Guide to Web App Security

Cybercrime continues to evolve and impact more people and businesses than ever before. Enterprise stakeholders must ensure they understand what could happen if their network is not secure and how they can protect their business online. Web apps today are a common source of security breaches for many enterprises because they lack necessary security measures. […]

how to prevent phishing

Learn What Phishing is and How to Prevent It

The security of your enterprise depends not only on the actual security procedures you have in place, but also in how well you and your employees follow those procedures. It’s vital to understand what you’re protecting the business against so you can explain to your employees exactly what they need to look out for. One […]

white hat hacker

Bad vs. Good Hackers: Your Guide to Ethical Hacking

Hacking has actually been around since before there were computers. In the early 20th century, hacking was used to crack codes during war times or even to hack telephones to be able to make free phone calls or cause other people to have huge phone bills. The 1980’s saw a more modern view of hackers, […]

The 10 Biggest Cybersecurity Issues That Can Take Down Your Data

The 10 Biggest Cybersecurity Issues That Can Take Down Your Data

Cybersecurity issues are one of the most significant problems facing business owners today. As many as 75% of data breaches are caused by external attackers. In light of this information, we wanted to bring your attention to ten of the biggest threats facing your cybersecurity tactics. Some of the topics we detail below overlap and often, two […]

5 Steps to Perform a Cyber Security Risk Assessment on Your Network

The first part of any cyber security audit is to assess risk. Risk is anything that could damage infrastructure, cost money from lost revenue, or threaten intellectual secrets. If you’re a small business owner and need to improvise, here are the steps to perform your own cursory review.   Review Your Network Resources   Before […]

SQL injection Hacks Work

How SQL Injection hacks work and how to stop them

SQL injection is a common hack used to run statements on your database server. If a hacker gains access to your SQL database, he can steal, delete or insert information. SQL injection hacks are tedious and complex to fix, so it’s best if a website owner takes precautions before becoming a victim. Before you can […]

How susceptible is my company to phishing?

Phishing – The “Unchartered” Territory   In today’s digital world, the risk presented by phishing is constantly increasing as the quantity and confidentiality of data stored electronically is rapidly increasing. Phishing is a growing threat and continues to be a pronounced problem for both companies and individuals. Despite being one of the oldest internet scams, […]

Social Media Hacking

Social Media Safety

    The Top 5 Social Media Threats ; Hidden URLs  – These are quite common, often times leading to a site that then asks for login information. Requests  – Someone may send you a warning or a request to take action or follow some link. Do not be fooled by these people, they will […]

3 Real Life Ethical Hacker Stories About #PasswordFails

  People are always asking me to tell “hacking” stories, since there are so many of them…I’m going to focus specifically on password related stories.   Here is a top 3 countdown to the craziest password story I have.    #3 – Bad passwords Yeah, yeah, yeah, I know everyone has heard this a million times, […]

PenTesting

Wifi Hackers

There are numerous WiFi hacking tools available on the web today that are capable of helping anyone hack into wireless networks. Some of the most popular wireless hacking tools include Aircrack, CoWPAtty, AirSnort, and Kismet.   The most popular WiFi protocols are WEP, WPA, and WPA2 systems. WPA2 systems are typically the most secure system, […]

Owasp

What is OWASP?

The Open Web Application Security Project (OWASP) is an online, open source, and non-profit organization that specializes in creating tools, methodologies, articles, and documentation about web application security. All of this information is freely available and the information is renowned to be practical and unbiased in nature. It also assists firms in developing, maintaining, and […]

scam phone call numbers

Recent Scam Phone Call – Numbers

Below is a list of some the most recent numbers associated with a scam phone call. If you are wondering whether or not to trust a phone number then Do Not Trust It.   Here are a few of the most reported scammer phone numbers recently;  (844) 809 – 6672 (844) 887 – 8082 (888) 489 […]