Skip to content

Linux Security Blog

How Hackers Work

Search
  • Home
  • Shep Tutorials
    • Set Up Security Shepherd On VMWare
    • Failure To Restrict Access – Solution
    • Insecure DOR – Solution
    • Poor Data Validation – Solution
    • Security Misconfiguration – Solution
    • Insecure Direct Object Reference 2 Solution
    • Cross Site Scripting One Solution
    • SQL Injection Solution
    • OWASP Security Shepherd – Failure To Restrict Access Solution
    • Session Management Challenge One – Solution
  • GNS3 Series
    • Install GNS3 2.2 on Windows10 | Download Link Included
    • Import VirtualBox Images to GNS3
  • Python Series
    • Part I
    • Part II
  • About

Category: Privacy

Cyber Security…

Apple’s Biggest Hack Ever: 4000 Malicious iOS Store Apps Linked to CIA?

26 Sep 2015
The First major cyber attack on Apple's App Store has now been linked to CIA (Central Intelligence Agency). Last week, Researchers disclosed some 39 iOS apps on Apple's App Store…
Hactivism…

Privacy group calls for a boycott of tech companies supporting CISA

26 Sep 2015
Privacy advocates are stepping up their lobbying efforts against the controversial cyber threat information sharing bill currently in Congress after several tech giants indicated their support. Activist group Fight for…
Privacy…

Hotspot Shield Launches VPN Plugins For Chrome And Firefox

18 Sep 201522 Sep 2015
A free and unrestricted internet can be a dangerous place, but it’s always important for the tools that prevent government or corporate censorship of the web to stay one step ahead…
Dark Net…

Mapping How Tor’s Anonymity Network Spread Around the World

18 Sep 201522 Sep 2015
ONLINE PRIVACY PROJECTS come and go. But as the anonymity software Tor approaches its tenth year online, it’s grown into a powerful, deeply-rooted privacy network overlaid across the internet. And…
Cyber Security…

Implanted Cisco routers are coming after you and your insecurities

15 Sep 201522 Sep 2015
SECURITY COMPANY Mandiant has warned that the mythical router implant security attack is a real thing, and that it has seen at least 14 incidents in the wild. The SYNful…
Hacking…

Hacking Team, Computer Vulnerabilities, and the NSA

15 Sep 201522 Sep 2015
When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or not? The debate exists because…
Dark Net…

Tor becomes extra secure as .onion becomes Special-Use Domain Name

15 Sep 201522 Sep 2015
Tor granted Special-use status by IETF, to become more secure and get security certificates. The dark web browser Tor has now become extra secure as the .onion url has now…
Cyber Security…

Flawed TLS Implementations Leak RSA Keys

10 Sep 201515 Sep 2015
A number of TLS software implementations contain vulnerabilities that allow hackers with minimal computational expense to learn RSA keys. Florian Weimer, a researcher with Red Hat, last week published a…
Legal…

California assembly passes digital privacy bill

10 Sep 201515 Sep 2015
The California state assembly has passed a digital privacy bill that aims to prevent government access without warrant to private electronic communications. The bill would provide some exceptions for law…
Attacks…

Employees put business data at risk by installing gambling apps on their phones

6 Sep 20156 Sep 2015
If you work for a large, global company, chances are some of your peers have installed gambling apps on the mobile devices they use for work, and that's bad news…
Legal…

Justice Department Cracks Down On The Use Of Cellphone Tracking Technology

4 Sep 20154 Sep 2015
Federal law enforcement officers will now be required to obtain a search warrant before using technology that tracks cellphone locations, according to a policy update issued by the Justice Department on Thursday.Under…
Open Source…

How to create an I2P Darknet site

20 Apr 201523 Jun 2020
Originally the concept of an anonymous network, developed by the military, was to send and receive messages that were encrypted and hard to decipher. Nowadays this network, known as the darknet…

Posts navigation

Newer posts

RSS ls -a /Zer0Days

  • [webapps] pfBlockerNG 2.1.4_26 - Remote Code Execution (RCE) 20 Feb 2023
  • [remote] SmartRG Router SR510n 2.6.13 - Remote Code Execution 11 Nov 2022
  • [webapps] CVAT 2.0 - Server Side Request Forgery 11 Nov 2022
  • [local] IOTransfer V4 - Unquoted Service Path 11 Nov 2022
  • [remote] AVEVA InTouch Access Anywhere Secure Gateway 2020 R2 - Path Traversal 11 Nov 2022

Follow Us

  • Twitter
  • Facebook
  • Tumblr
  • Reddit

RSS Crypto News

  • An error has occurred; the feed is probably down. Try again later.

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,439 other subscribers

ls /categories

AppSec Attacks Bugs Cryptography Cyber Security Education Encryption Entertainment Exploits Hacking Linux Open Source Operating Systems OWASP Penetration Testing Privacy Security Technology Tips Tutorials

ls /comments

dark92i (@dark92i) on The Hidden Wiki
Foster Eli on Best Darkweb Links
crypstalk21 on Securing Your Crypto Wallet
kioptrix vm on PenTesting: Gaining Root Privi…
Johnny Dickman (@Dar… on The Darknet 2019
XXS Attack – P… on Payload in PDF

ls -a -v /community

ls /MostVisited

  • Write a Ping Sweeper in 4 Lines of Bash
    Write a Ping Sweeper in 4 Lines of Bash
  • Best Darkweb Links
    Best Darkweb Links
  • Crack WPA Handshake using Aircrack with Kali Linux
    Crack WPA Handshake using Aircrack with Kali Linux
  • Payload in PDF
    Payload in PDF
  • BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
    BlueKeep - Exploit Windows (RDP Vulnerability) Remotely
  • Find Vulnerable Devices On The Internet With Shodan
    Find Vulnerable Devices On The Internet With Shodan
  • Import VirtualBox Images to GNS3
    Import VirtualBox Images to GNS3
  • How to install WebGoat on Ubuntu
    How to install WebGoat on Ubuntu
  • CSRF Code Examples and Defense
    CSRF Code Examples and Defense
  • Install DVWA on Ubuntu AWS
    Install DVWA on Ubuntu AWS

ls /Archives

Follow Linux Security Blog on WordPress.com

We Use Social Media

  • Twitter
  • Reddit
  • Facebook
  • Tumblr
  • Pinterest
  • YouTube
Create a website or blog at WordPress.com
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Follow Following
    • Linux Security Blog
    • Join 270 other followers
    • Already have a WordPress.com account? Log in now.
    • Linux Security Blog
    • Customize
    • Follow Following
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar