Blockchain… Breaking News: More Than $600 Million Stolen In Ethereum And Other Cryptocurrencies—Marking One Of Crypto’s Biggest Hacks Ever 10 Aug 202110 Aug 2021 https://www.forbes.com/sites/jonathanponciano/2021/08/10/more-than-600-million-stolen-in-ethereum-and-other-cryptocurrencies-marking-one-of-cryptos-biggest-hacks-ever/?sh=413075dd7f62
#Metasploit… Heartbleed Discovery and Exploit 1 Feb 202018 Jun 2020 Heartbleed is a security bug in the OpenSSL cryptography library, which is a widely used implementation of the Transport Layer Security protocol. It was introduced into the software in 2012…
Attacks… Crack WPA Handshake using Aircrack with Kali Linux 29 Oct 201924 Jul 2020 Today's tutorial will be looking into how you can crack the password of the 4 way handshake of someone that is re-authenticating themselves to a wireless router. The goal is…
#career… Set up some Honeypots and a Threat Map 2 Sep 201924 Jul 2020 Welcome back my fellow ethical hackers. Remember, the contents in this post is for educational purposes and should only be used for ethical reasons, so with that caveat, let's get…
AppSec… Securing Your Crypto Wallet 22 Aug 201924 Jul 2020 by Areeb Soo Yasir · Published · 2019-08-22 Why the world misses out on basic user-based security and isolation. When it came time to create my CryptocurrencyOS, based on Linux…
#career… OWASP A2: Broken Authentication and Session Management Cause and Prevention 12 May 201924 Jul 2020 Threat Agents Attack Vectors Security Weakness Technical Impacts Business Impacts Application Specific Exploitability AVERAGE Prevalence WIDESPREAD Detectability AVERAGE Impact SEVERE Application / Business Specific Consider anonymous external attackers, as well…
#career… Web Application Security 21 Feb 201924 Jul 2020 WHAT IS WEB APPLICATION SECURITY Web application security is the process of protecting websites and online services against different security threats that exploit vulnerabilities in an application’s code. Common targets…
Android Security… It’s Time To take back Our Internet 20 Jan 201920 Jan 2019 Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
AppSec… Create a Backdoor with Cryptcat 23 Dec 2018 In this tutorial, I'll introduce you to netcat's popular cousin, cryptcat (she's actually much cuter and more exotic than the plain netcat). Cryptcat enables us to communicate between two systems and encrypts…
#career… Now Is The Time, Linux is the Direction 11 Nov 201824 Jan 2019 Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
AppSec… OWASP Security Shepherd- Session Management Challenge One – Solution – LSB 12 Oct 201812 Oct 2018 We have another solution in the OWASP Security Shepherd challenges and we enjoyed completing this one. You can find out about Session Management from OWASP here. So let's get on…
AppSec… OWASP Security Shepherd – Insecure Cryptographic Storage Challenge 1 Solution – LSB 21 Sep 2018 Thanks for visiting and today we have another OWASP Security Shepherd Solution for you. This time it's the Insecure Cryptographic Storage Challenge. Cryptography is usually the safest way to communicate…
Crypto Currency… Ratecoin (XRA) 21 Jun 201821 Jun 2018 The genesis and general development history of Ratecoin is marked by some low points. Her entire program landscape was tackled several times from scratch, but each time she fell into oblivion. In…
Crypto Currency… VOISE – Once in a generation the whole game changes 2 May 2018 VOISE is a blockchain powered anonymous decentralized platform with personalized token based on Ethereum's smart contract ecosystem for transactions. VOISE is an innovative cryptocurrency powered solution for the music industry…
Cryptography… Metal (MTL) | Shaping Digital Money 6 Mar 20186 Mar 2018 Transfer money instantly around the globe with nothing more than a phone number. Earn rewards every time you spend or make a purchase. METAL ROCKS The Digital Wallet Earn rewards…
Crypto Currency… Top Ten Cryptocurrencies 20 Feb 201820 Feb 2018 10. Dash (DASH) $718.42 USD A revolutionary digital money system. Use Dash to make instant, private payments online or in-store using our secure open-source platform hosted by thousands of users around the…
Crypto Currency… Etherium | Crypto Royalty 30 Jan 20182 Feb 2018 Build unstoppable applications Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, censorship, fraud or third-party interference. These apps run…
Crypto Currency… DasCoin | Taking Cryptocurrency Mainstream 30 Jan 201830 Jan 2018 The Hybrid Solution And Why It’s Better The latest coin in the crypto currency world coming from Ireland. It's doing quite well and looks to be getting stronger. DasCoin combines…
Crypto Currency… Could Cryptocurrencies Take Over the US Dollar as World Reserve Currency? 22 Jan 2018 COULD BITCOIN REPLACE THE DOLLAR? Cryptocurrencies were the clear winner of 2017. Major cryptocurrencies like Bitcoin, Ethereum and Litecoin have massively increased in value over the year, effectively outperforming investments…
#career… Eryllium (ERY) 22 Jan 201822 Jan 2018 Welcome back fellow crypto traders, we have an exciting coin to introduce to you today. If you'd like to get into crypto trading go visit our earlier post about getting…
Crypto Currency… QubitCoin (Q2C) 13 Jan 201814 Jan 2018 Welcome back fellow crypto traders. Todays flavour of the day is Q2C, for around 1.2 cent a pop. Qubitcoin was started on Jan 12 2014 as an CPU and GPU…
Crypto Currency… Will 2018 be the rise of the AltCoin? 11 Jan 201813 Jan 2018 There's lots of chatter on crypto chat forums about this year being the year of the AltCoin (short for alternative coins). These are basically the small fries in the crypto…
Data Mining… How To Get Started In Trading Crypto Currency 4 Jan 20184 Jan 2018 As my readers probably know crypto currency is taking over the World. Even banks are getting in on it now. I'd like to share some decent advice to my followers…
Crypto Currency… Litecoin (LTC) making a killing 13 Dec 201713 Dec 2017 If you invested in Litecoin a few weeks ago, you would now have a profit of 1600%. So your initial investment of €20 would now be around $320 for each coin…
Cryptography… GPG on Linux 9 Dec 2017 1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
AppSec… OWASP – A2 – Broken Authentication and Session Management – LSB 24 Nov 201729 Jun 2018 Threat Agents Consider anonymous external attackers, as well as users with their own accounts, who may attempt to steal accounts from others. Also consider insiders wanting to disguise their actions.…
Dark Net… Best Darkweb Links 20 Nov 201724 Jul 2020 Disclaimer: We are not responsible for anything you may access or view on the darkweb. This post is for educational purposes. Please be cautious and enter at your own risk,…
Crypto Currency… Let’s Untangle Blockchain 12 Nov 201726 Apr 2019 In a not too distant future, everything from our banking, supply chains, law, accountancy, communications services – and even governments – will have been redefined. Dramatically more egalitarian means of…
AppSec… OWASP Security Shepherd – Security Misconfiguration – Solution – LSB 2 Nov 201712 Dec 2019 Welcome back to another OWASP Security Shepherd solution. This challenge is called Security Misconfiguration. So we are given a Username and Password field and we can get the result key…
Cloud Security… Forget VPN’s for private browsing, get involved with TOR 3 Apr 20174 Apr 2017 Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Attacks… Cracking WPA/WPA2 Encryption 15 Jan 201725 Aug 2019 A little Disclaimer – The contents of this post are solely for ethical and educational purposes. You may not use it for unethical purposes. The Author or the Website is…
Encryption DNA-Based Encrypted Storage 21 Jul 201621 Jul 2016 Researchers at Sandia National Laboratories in New Mexico are experimenting with encrypted DNA storage for archival applications. Husband and wife team George and Marlene Bachand are biological engineers with a…
Encryption Encrypt Your Digital Life 13 Apr 201613 Apr 2016 Encryption is the process of transforming information so that a third party cannot read it. These days we share photos of our family and friends on social media platforms and…
Encryption Free HTTPS Encryption for all WordPress Blogs 9 Apr 20169 Apr 2016 Do you own a custom domain or a blog under the wordpress.com domain name? If yes, then there is good news for you. WordPress is bringing free HTTPS to every…
Cyber Security… Using PGP/GPG Like A Pro 25 Mar 201625 Mar 2016 Hello. I have noticed a lack of proper tutorials on how to use PGP/GPG. I also noticed that the ones which did exist focused on using a GUI application. As…
Android Security… Keeping Your Android Device Secure 5 Feb 201625 Aug 2019 Most people these days carry a mobile phone or tablet on their person. Some people even have two, maybe an extra device for work. Globally there are an estimated 6…
Encryption Close the Internet!! 11 Dec 201511 Dec 2015 Guess what? There's not. There never will be. So, when Donald Trump rants: We're losing a lot of people because of the Internet and we have to do something. We…
Encryption… How the NSA can break trillions of encrypted Web and VPN connections 17 Oct 201517 Oct 2015 For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from…
Encryption Encryption Is More Important, and Easier, Than Ever 16 Oct 201516 Oct 2015 SAN FRANCISCO — Twenty years after Netscape introduced encryption to web browsers to safeguard the private data of Internet users, roughly two-thirds of web traffic still moves on unprotected channels,…
#Metasploit… Exploring the Hacker Tools of Mr. Robot 15 Sep 201525 Aug 2019 Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…