FSC Hack Day

FSC Hack Day specialise in Cyber Security information, news and guides. We provide the latest information available on software and web vulnerabilities and how to prevent them.

 

Our Blog

Social Engineering Techniques

Social Engineering Techniques

Social engineering is a malicious attack used by hackers to obtain sensitive information by tricking naive or unsuspecting users to revealing sensitive information that compromising sensitive data security. Generally, individuals will tend to refer to social...

The Causes of Company Security Breaches

The Causes of Company Security Breaches

Recent news and reports from all over the world has been focusing on the increasing company security breaches and the often devastating consequences these intrusions can have on a company's data and its customers. However, one area that is often overlooked is the...

What Is Jamb Reinforcement For A Security Door?

What Is Jamb Reinforcement For A Security Door?

A security door jamb is an important component to the security of a house. This component serves as a means of protecting the interior of the house from forced entry. A good security door jamb should be strong enough to withstand the force if a person tries to force...

PCI Compliance Testing for Service Providers

PCI Compliance Testing for Service Providers

PCI compliance testing is necessary for all type of service providers that have transactions with customers on a regular basis. The most important types of business relationships include credit card processing, debit card transactions and electronic funds transfers....

Getting Started With pentesting for Beginners

Getting Started With pentesting for Beginners

Pentest for Beginners is an 8 week course that will teach you how to carry out advanced attacks and get details of weak spots in network security. The idea behind protesting is to not only find out what vulnerable points exist on a system, but also to do a reverse...

Penetration Testing Methods

Penetration Testing Methods

Penetration testing is a kind of penetration testing that involves checking the operation of the software application. It mainly involves checking the programs and their interaction with the operating system to find out whether there are any defects in the way it is...

Using Flash Drive Pens to Define Flash

Using Flash Drive Pens to Define Flash

Flash drives and pens are very similar and yet they really function differently. Some people are even confused between them. Most people also think that flash drives and pen drive are one. This comes from the simple fact that each pen drive is actually flash...

Hackers – A Documentary About Computer Espionage

Hackers – A Documentary About Computer Espionage

In the world of hacking, there is no doubt that a documentary on this dark side of our cyber-space has to be planned and produced. Hacking documentaries are the best way for the general public to get a glimpse of what the computer hacker goes through, the kind of...

Common Vulnerability Assessment Processes

Common Vulnerability Assessment Processes

Common vulnerability assessment procedures include:A) Network Vulnerability Assessment: This is the most common vulnerability assessment procedure. The objective of conducting an assessment for a vulnerability is to identify the vulnerable areas of a system or network...

Leave A Message