Skip to main content

Michele M Jordan

Anglia Ruskin University
Open Source

3 years Full Time

London Metropolitan University
Open Source

3 years Full Time

University of Glamorgan, Cardiff and Pontypridd
Open Source

3 years Full Time

University of Glamorgan, Cardiff and Pontypridd
Open Source

2 years Full Time

Middlesex University
Open Source

3 years Full Time

Middlesex University
Open Source

4 years Full Time

University of Sunderland
Open Source

2 years Full Time / 3 years Sandwich Course

The University of Huddersfield
Open Source

3 years Full Time / 4 years Sandwich Course

WebsiteDefender
Open Source

WP Security Scan checks your WordPress website/blog for security vulnerabilities and suggests corrective actions such as: 1. Passwords 2. File permissions 3. Database security 4. Version hiding 5. WordPress admin protection/security ...

Category Website Scanners
WPScan
Open Source

The WPScan CLI tool is a free, for non-commercial use, black box WordPress security scanner written for security professionals and blog maintainers to test the security of their sites.

Category Website Scanners
WPScan Wordpress Security Scanner
Kaspersky Lab
Commercial

Kaspersky Mobile Security combines innovative anti-theft defense with advanced Internet threat protection to ensure the safety of your Smartphone. Whether your phone is lost or stolen, or is targeted while you’re surfing the internet, you know your person ...

Category Mobile Devices
Kaspersky Internet Security for Android
Lan-Secure Company
Commercial

Wireless Protector is windows software that automatically disables wireless 802.11 / Broadband devices on computers that connected to the network LAN and re-enable the devices when the LAN cable is disconnected from the protected compu ...

Category Wireless Tools
Wireless Protector
Swivel Secure Ltd
Commercial

PINsafe from Swivel Secure allows tokenless two factor and strong authentication without the expense and hassle of carrying around tokens maing it suitable for large scale and corporate through to small deployments. Using a simple PIN extraction proc ...

PINsafe
bindshell.nl
Open Source

Inundator is a multi-threaded, queue-driven, anonymous intrusion detection false positives generator with support for multiple targets. At a high level, Inundator builds an attack queue, organized by destination port, by parsing the content: and uricon ...

Category IPS Evasion
Lan-Secure Company
Commercial

Security Center network access protection software designed to provide real-time network security monitor for intrusion detection IDS and prevention IPS that helps to protect networks from being vulnerable to unauthorized network connections, malicious ne ...

Category IPS Network
Lan-Secure Security Center
Subgraph
Open Source

Vega is a GUI-based, multi-platform (OS X, Linux, Windows), free and open source web security scanner that can be used to find instances of SQL injection, cross-site scripting (XSS), and other vulnerabilities in your web applications. Vega also includes a ...

Category Website Scanners
Vega
Trend Micro
Commercial

With the explosion of smartphones in the workplace, employees have recognized and demanded support for a growing list of new ways to leverage this technology for their work. Faced with the realities of dealing with an increasingly mobile workplace, organi ...

Category Mobile Devices
Mobile Security for Enterprises
AVG Technologies
Freeware

Android Antivirus Once installed, it runs silently to protect you from the latest viruses, malware, spyware, unsafe apps and settings, and other nasty threats.   Anti-Theft Phone Tracker Just visit our Anti-Theft website from another de ...

Category Mobile Devices
AVG AntiVirus for Android
Honeynet Project
Freeware

A.R.E, the Android Reverse Engineering Virtual Machine. This VirtualBox-ready VM includes the latest Android malware analysis tools as follows: * Androguard * Android sdk/ndk * APKInspector * Apktool * Axmlprinter * Ded * Dex2jar * DroidBox * Ja ...

Category Forensic Tools
pjlantz
Freeware

DroidBox is developed to offer dynamic analysis of Android applications. The following information is described in the results, generated when analysis is complete: Hashes for the analyzed package Incoming/outgoing network data File read and write op ...

Category Forensic Tools
DroidBox