Quantcast
Channel: Dimitar Kostadinov, Author at Infosec Resources
Browsing latest articles
Browse All 101 View Live

Spoofing and Anonymization (Hiding Network Activity)

Introduction Forensic investigators should always pay heed to the possibility of a cybercriminal to have been using spoofing and anonymizing techniques to cover the tracks left by his digital...

View Article



Data Integrity and Backups

Introduction Data integrity means that a given data set is accurate, complete, consistent, unchanged (original or a true copy) and trustworthy throughout its entire lifecycle, which is ensured through...

View Article

Common Security Threats Discovered Through Vulnerability Assessments

Common Security Threats Discovered Through Vulnerability Assessments  A vulnerability assessment can efficiently highlight a huge number of diverse security issues. Here are our top 10 security threats...

View Article

Common Vulnerability Assessment Types

A vulnerability assessment is a process so complicated that it often requires a comprehensive approach. This would mean that a multiple sub-assessments are to be executed – each of which spanning...

View Article

Machine Learning for Social Engineering

 Social engineering is a form of communication that aims at gaining people’s trust at first and then prompting them to share sensitive information or do something the attacker would take advantage of,...

View Article


Engineering a Twitter spearphishing bot from machine learning

The term bot is derived from a web robot. A web robot is a type of software that can perform automated tasks over the internet and it is enhanced with machine learning capabilities. In 2014, Twitter...

View Article

Engineering voice impersonation from machine learning

Text-to-speech (TTS) synthesis is the computer’s way of transforming text to audio. Most popular AI-driven personal assistants rely on TTS software to generate as natural-sounding speech as possible....

View Article

Engineering speech recognition from machine learning

Speech recognition operates on human inputs that allow users to communicate with machines (e.g., computers, smartphones and home assistants) and machines to respond to an implanted voice.  To work...

View Article


Image may be NSFW.
Clik here to view.

Engineering personality analysis from machine learning

Machine learning (ML) is used to predict many things in our life, such as bitcoin prices, sports results, weather forecasts and movie ticket prices. Numerous researchers have shown that machine...

View Article


Image may be NSFW.
Clik here to view.

Information and asset classification in the CISSP exam

This article is part of our CISSP certification prep series. For more CISSP-related resources, see our CISSP certification hub. This article will help you answer two questions related to the CISSP...

View Article
Browsing latest articles
Browse All 101 View Live




Latest Images