Education… Getting Anonymously Harassed Online? Try This! 17 Aug 202017 Aug 2020 Lots of people are bullied or harassed online from anonymous users on different Social Media platforms that use different accounts and personas. So let's look at how we can try…
Attacks… Discover & Attack Raspberry Pi’s on a Network 16 Jun 202024 Jul 2020 Many people never bother to change their default password on their devices. For a Raspberry Pi, this can leave it extremely vulnerable. Today, we will be looking at a little…
AppSec… Movies Featuring the Nmap Security Scanner 6 Oct 201930 Oct 2019 The Nmap Security Scanner has appeared in many major motion pictures (as well as more obscure films). This gallery provides screen shots and details for each movie. Source: Movies Featuring…
Cyber Security… Send Secret Files in an Image Using Steganography 2 Oct 201924 Jul 2020 Steganography is data hidden within data. It enables us to embed files, messages or links into an image that can't be detected by email filters. So we can send secret…
Cryptography… The Darknet 2019 7 Apr 201924 Jul 2020 Do you want to access the update about deep web links or, the hidden wiki, Deep web sites, Dark web Search, The Dark Web Links, tor onion links, tor hidden wiki links, deep web sites…
AppSec… OWASP Security Shepherd – Cross Site Scripting One Solution – LSB 12 Sep 201812 Sep 2018 Welcome back to LSB my budding hackers. Today's lesson is about Cross Site Scripting (Or XSS). Cross-Site Scripting (XSS) attacks are a type of injection, in which malicious scripts are injected…
Android Security… How To Find And Delete Where Google Knows You’ve Been 14 Aug 201814 Aug 2018 Even if “Location History” is off on your phone, Google often still stores your precise location Here are some things you can do to delete those markers and keep your location…
Cloud Security… Forget VPN’s for private browsing, get involved with TOR 3 Apr 20174 Apr 2017 Recently President Trump reversed a privacy law that was introduced in the last administration, that prevented Internet Service Providers (ISP's) from selling your data to advertisers. When I say your…
Privacy… A new Tor that can resist next-generation state surveillance 1 Sep 20161 Sep 2016 Tor is an imperfect privacy platform. Ars meets the researchers trying to replace it. J.M. Porup - 31/8/2016, 07:25 Since Edward Snowden stepped into the limelight from a hotel room in Hong…
Spying Police Used Stingrays in Planes to Spy on Phones 2 Feb 20162 Feb 2016 THE GOVERNMENT’S USE of a controversial invasive technology for tracking phones just got a little more controversial. The Anaheim Police Department has acknowledged in new documents that it uses surveillance…
Spying Internet firms to be banned from offering unbreakable encryption 3 Nov 20153 Nov 2015 Internet and social media companies will be banned from putting customer communications beyond their own reach under new laws to be unveiled on Wednesday. Companies such as Apple, Google and…
#Metasploit… Exploring the Hacker Tools of Mr. Robot 15 Sep 201525 Aug 2019 Over the years the most famous hacking tool that has made it into the movies is Nmap. When producers of a movie actually try to put a dose of reality…
Hacking… Hacking Team, Computer Vulnerabilities, and the NSA 15 Sep 201522 Sep 2015 When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or not? The debate exists because…
Legal… Justice Department Cracks Down On The Use Of Cellphone Tracking Technology 4 Sep 20154 Sep 2015 Federal law enforcement officers will now be required to obtain a search warrant before using technology that tracks cellphone locations, according to a policy update issued by the Justice Department on Thursday.Under…