#career… Configuring Your IAM Securely on AWS 20 Dec 201924 Jul 2020 To help secure your AWS resources, follow these recommendations for the AWS Identity and Access Management (IAM) service. Lock Away Your AWS Account Root User Access Keys You use an…
Cyber Security… How To Fully Anonymize Your IP 20 Nov 201924 Jul 2020 As a security professional, sometimes you will want to anonymize your web traffic so as not to set alarms off. Today we will be looking at TOR and a tool…
AppSec… Securing Your Crypto Wallet 22 Aug 201924 Jul 2020 by Areeb Soo Yasir · Published · 2019-08-22 Why the world misses out on basic user-based security and isolation. When it came time to create my CryptocurrencyOS, based on Linux…
AppSec… ProxyChains For Anonymity 29 May 201924 Jul 2020 Introduction Proxychains is an incredibly useful tool that is incredibly poorly documented. In this tutorial, we will cover using proxychains and SSH to connect to a multihomed device (like a…
Cryptography… The Darknet 2019 7 Apr 201924 Jul 2020 Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
Android Security… It’s Time To take back Our Internet 20 Jan 201920 Jan 2019 Tim Berners Lee was recently awarded the Turing Award (The ACM A.M. Turing Award is an annual prize given by the Association for Computing Machinery (ACM) to "an individual selected…
Crypto Currency… Banks Must Embrace Crypto or “Bite the Dust” 16 Nov 2018 With all the constant news about the price of Bitcoin, it’s possible to forget what it was invented for. Cryptocurrency trading plays only a small role in what Bitcoin and…
#career… Now Is The Time, Linux is the Direction 11 Nov 201824 Jan 2019 Your future matters to us @ LSB, so get into Linux and see the new world it will open for you. Created by QuBits 2018-11-11
Cryptography… The Hidden Wiki 11 Nov 20185 Mar 2019 If you did not know yet the Hidden Wiki is a list of well known Dark Net Sites that will get you started browsing on the other internet. To access…
Android… Best Ad Blocker Apps For Android 11 Nov 201811 Nov 2018 By Khaled Shariar - LAST UPDATED: August 10, 2018 Want to get rid of annoying ads? Check out the following ad blocker for android to stop seeing ads on Android.…
Android Security… How To Find And Delete Where Google Knows You’ve Been 14 Aug 201814 Aug 2018 Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
AppSec… Spamming Facebook Messages 3 Jan 201811 Apr 2018 We have reported this bug to Facebook and they replied asking "How is this different than hitting the message button?" If you want to spam everyone in the World that…
Cryptography… GPG on Linux 9 Dec 2017 1 Introduction Encryption is the process of encoding messages or information in such a way that only authorized parties can read them. With almost no privacy in this digital generation…
AppSec… A Guide to Not Getting Hacked 20 Nov 20175 Mar 2019 Hackers steal hundreds of millions of passwords in one swoop and occasionally cause large-scale blackouts. The future is probably not going to get better, with real-life disasters caused by internet-connected knick-knacks, smart home robots that could kill…
Dorking… Google Dorking 16 Nov 201720 Nov 2017 As you all know Google is the most popular search engine in the world. Google serves almost 80% of the search queries on the internet. It itself a big achievement. By doing power…
Dark Net… How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable 17 Aug 201717 Aug 2017 Welcome back, my tenderfoot hackers! Well, the first season of Mr. Robot just ended and Elliot and fsociety successfully took down Evil Corp! They have effectively destroyed over 70% of the world's…
Legal… Aaron Swartz and MIT: The inside story 29 Jul 201729 Jul 2017 The mysterious visitor called himself Gary Host at first, then Grace Host, which he shortened for his made-up e-mail address to “ghost,” a joke apparently, perhaps signaling mischievousness — or…
Attacks… How Shipping Giant Maersk Dealt With a Malware Meltdown, And Other Security News This Week 3 Jul 20173 Jul 2017 WHEN A PIECE of unprecedented malicious software rampages through thousands of critical networks around the world, it tends to get our full attention. And this week's digital plague, known as…
Cyber Security… SSH Tunneling 9 May 201710 Mar 2020 Recently I wanted to set up a remote desktop sharing session from home pc to my laptop. While going through the set up guide I came across ssh tunneling. Even…
Cloud Security… Forget VPN’s for private browsing, get involved with TOR 3 Apr 20174 Apr 2017 Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Privacy… Facebook manifesto redacted to omit plans for AI to monitor private messages 19 Feb 201719 Feb 2017 An earlier version of Mark Zuckerberg's 6,000-word manifesto for Facebook revealed his belief that artificial intelligence could one day be used to monitor private messages for terrorists scheming an attack.…
Privacy Upgrade your SSH keys! 24 Sep 201624 Sep 2016 Whether you're a software developer or a sysadmin, I bet you're using SSH keys. Pushing your commits to Github or managing your Unix systems, it's best practice to do this…
Privacy… A new Tor that can resist next-generation state surveillance 1 Sep 20161 Sep 2016 Tor is an imperfect privacy platform. Ars meets the researchers trying to replace it. J.M. Porup - 31/8/2016, 07:25 Since Edward Snowden stepped into the limelight from a hotel room in Hong…
Cyber Security… Schneier has joined the Tor project 15 Jul 201616 Jul 2016 It's with great satisfaction that I bring you the news that security expert Bruce Schneier has joined the Tor project as a director. Schneier has just confirmed it on his…
Privacy App Tracks Where Governments Hack Activists and Reporters 28 May 201628 May 2016 IN AN AGE when spies carefully hide their tracks through layers of obfuscation and proxy servers, locating the perpetrators of online surveillance is often nearly impossible. But the victims…
Privacy Keep Identity Anonymous Using Tor and VPN 19 Apr 201619 Apr 2016 ANONABOX DEVICES BLEND TOR AND VPN TOGETHER TO PROVIDE USERS WITH UTMOST ANONYMITY ON THE INTERNET Anonabox, a hardware company focused on providing internet security and privacy for users has announced…
Privacy An NSA-Proof Twitter, Built With Code From Bitcoin and BitTorrent 13 Apr 201613 Apr 2016 When mass political protests erupted throughout Brazil in June, Miguel Freitas did what countless others did: He followed the news on Twitter. Tweets revealed information he couldn’t get anywhere else,…
Privacy Who’s tracking your location? Just about everybody 8 Apr 20168 Apr 2016 That pricey device in your pocket knows exactly where you are. And it’s sharing your location with more people than you realize. Your smartphone is equipped with antennas that send…
Cyber Security… Tor Project says it can catch spying code 29 Mar 201629 Mar 2016 The Tor Project is fortifying its software so that it can quickly detect if its network is tampered with for surveillance purposes, a top developer for the volunteer project wrote…
Cryptography… Setup a VPN On Kali Linux For Anonymity 16 Mar 201628 Nov 2019 Virtual Private Networks (vpn) create an encrypted ‘tunnel’ between your computer and the host server, with the internet traffic going in and out of the host server. Your ISP or…
Cyber Security… Contribute to privacy: Configure a TOR relay 9 Mar 20169 Mar 2016 The Tor network relies on volunteers to donate bandwidth. The more people who run relays, the faster the Tor network will be. If you have at least 2 megabits/s for…
Privacy How Mobile Ads Leak Personal Data 23 Feb 201623 Feb 2016 The personal information of millions of smartphone users is at risk due to in-app advertising that can leak potentially sensitive user information between ad networks and mobile app developers, according…
Privacy Google Has Gathered Info On You. Here’s How To Delete It! 9 Feb 20169 Feb 2016 In the past there was the Roman Empire, the Ottoman Empire and the Persian Empire. Over here in 2015 we have the Google empire. No seriously, think about it! Google…
Privacy Comodo’s so-called ‘Secure Internet Browser’ Comes with Disabled Security Features 3 Feb 20163 Feb 2016 Beware Comodo Users! First of all, make sure whether your default browser had been changed to "Chromodo" -- a free browser offered by Comodo Antivirus. If your head node is…
Privacy Privacy rejoice: Facebook’s Android app now supports Tor 20 Jan 201622 Feb 2017 Facebook has added the option to route traffic from its Android mobile app over the Tor anonymity network. This will come as good news for privacy-conscious users or those living…
Cryptography… Moves to rein in ‘dark’ networks 7 Dec 201522 Feb 2017 A key House lawmaker is pushing a new initiative to deal with the proliferation of encrypted technologies that critics say allow terrorists to communicate without detection. The effort from House…
Dark Net… Tor Project appeals for help to continue 25 Nov 201522 Feb 2017 The Tor anonymous browsing project has asked for donations to improve the network and invest in educational projects. The Tor Project is a non-profit scheme which runs Tor. Otherwise known…
Privacy Beware of ads that use inaudible sound to link your phone, TV, tablet, and PC 19 Nov 201522 Feb 2017 Privacy advocates are warning federal authorities of a new threat that uses inaudible, high-frequency sounds to surreptitiously track a person's online behavior across a range of devices, including phones, TVs,…
Privacy… Tor launches anti-censorship Messenger service 2 Nov 20152 Nov 2015 A new chat tool has been launched in an effort to improve the security of online messaging. Tor Messenger allows users to chat over the Tor (The Onion Router) network…
Privacy CISA data-sharing bill passes, a sad day for privacy on the internet. 29 Oct 2015 A controversial draft law, which one senator called a "surveillance bill by another name," has passed the Senate. CISA, the Cybersecurity Information Sharing Act (S. 754), will allow private companies…
Encryption… How the NSA can break trillions of encrypted Web and VPN connections 17 Oct 201517 Oct 2015 For years, privacy advocates have pushed developers of websites, virtual private network apps, and other cryptographic software to adopt the Diffie-Hellman cryptographic key exchange as a defense against surveillance from…
Privacy Landmark EU ruling says US privacy protections are inadequate 6 Oct 2015 Europe's highest court today ruled that Facebook cannot send personal information on European users to data centers in the US, invalidating a 15-year trans-Atlantic data transfer agreement. In a decision that…
You must be logged in to post a comment.