FSC Hack Day

FSC Hack Day specialise in Cyber Security information, news and guides. We provide the latest information available on software and web vulnerabilities and how to prevent them.

 

Our Blog

What Is the Top Flash Drive Hacks?

What Is the Top Flash Drive Hacks?

Flash drives are often used to store large volumes of data for business purposes. The problem with these drives is that they have limited life and when their lifespan reaches its end, they are not easy to fix. If you are looking for ways to make your flash drive last...

Types of USB Drives to Check Out

Types of USB Drives to Check Out

USB sticks have become the most commonly used things around. They have saved companies a lot of money in being able to supply information quickly and efficiently to customers, allowing for quick responses. However, just like any other kind of computer peripheral,...

What is Pen Drive? – Is a USB Writeable?

What is Pen Drive? – Is a USB Writeable?

Pen drives are a type of memory stick, designed to be used with a computer and available in many different sizes and speeds. They can also be used as a portable storage device, including for media such as music, photographs and videos. These devices have the ability...

Social Engineering Techniques

Social Engineering Techniques

Social engineering is a malicious attack used by hackers to obtain sensitive information by tricking naive or unsuspecting users to revealing sensitive information that compromising sensitive data security. Generally, individuals will tend to refer to social...

The Causes of Company Security Breaches

The Causes of Company Security Breaches

Recent news and reports from all over the world has been focusing on the increasing company security breaches and the often devastating consequences these intrusions can have on a company's data and its customers. However, one area that is often overlooked is the...

What Is Jamb Reinforcement For A Security Door?

What Is Jamb Reinforcement For A Security Door?

A security door jamb is an important component to the security of a house. This component serves as a means of protecting the interior of the house from forced entry. A good security door jamb should be strong enough to withstand the force if a person tries to force...

PCI Compliance Testing for Service Providers

PCI Compliance Testing for Service Providers

PCI compliance testing is necessary for all type of service providers that have transactions with customers on a regular basis. The most important types of business relationships include credit card processing, debit card transactions and electronic funds transfers....

Getting Started With pentesting for Beginners

Getting Started With pentesting for Beginners

Pentest for Beginners is an 8 week course that will teach you how to carry out advanced attacks and get details of weak spots in network security. The idea behind protesting is to not only find out what vulnerable points exist on a system, but also to do a reverse...

Penetration Testing Methods

Penetration Testing Methods

Penetration testing is a kind of penetration testing that involves checking the operation of the software application. It mainly involves checking the programs and their interaction with the operating system to find out whether there are any defects in the way it is...

Leave A Message