Bioficial Hollow 3 min read Videos Bioficial Hollow admin December 31, 2015 This work examines and dissects the potentiality of organ donation within virtual communities like Second Life. It...Read More
Linode Hit by DDoS Attacks 2 min read Cyber Attack | Data Breach Linode Hit by DDoS Attacks admin December 31, 2015 Cloud hosting company Linode has suffered a series of service interruptions due to distributed denial-of-service (DDoS) attacks...Read More
Android Malware Uses Built-in Firewall to Block Security Apps 2 min read Malware Android Malware Uses Built-in Firewall to Block Security Apps admin December 31, 2015 Even if some malware families never get to cause worldwide damage, it’s sometimes interesting to read about...Read More
Microsoft is Collecting Your Encryption Keys, Here’s How to Delete it 3 min read Privacy Microsoft is Collecting Your Encryption Keys, Here’s How to Delete it admin December 31, 2015 It is possible to prevent encryption keys from reaching Microsoft’s Servers – Learn how: It is a...Read More
Anonymous to release documents to prove Steven Avery is framed by police in a murder case 4 min read News Anonymous to release documents to prove Steven Avery is framed by police in a murder case admin December 31, 2015 Anonymous gets involved in Steven Avery case, claiming police corruption It is well known that the online...Read More
Tor Project To Launch Bug Bounty Program 2 min read Cryptography News Tor Project To Launch Bug Bounty Program admin December 31, 2015 2 Tor would soon be launching a bounty program which would reward any person who finds a vulnerability...Read More
DHS: Drug Traffickers are hacking surveillance drones on the border 2 min read Cyber Attack | Data Breach News DHS: Drug Traffickers are hacking surveillance drones on the border admin December 31, 2015 The U.S. Department of Homeland Security and local law enforcement confirmed that Drug Traffickers are hacking surveillance...Read More
jSQL Injection v0.73 – Java Tool For Automatic SQL Database Injection. 1 min read Pentest Tools jSQL Injection v0.73 – Java Tool For Automatic SQL Database Injection. admin December 31, 2015 jSQL Injection is a lightweight application used to find database information from a distant server. jSQL is...Read More
M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone (deutsche Übersetzung) 1 min read Videos M. C. McGrath: Collect It All: Open Source Intelligence (OSINT) for Everyone (deutsche Übersetzung) media.ccc.de December 30, 2015 Governments post reports and data about their operations. Journalists publish documents from whistleblowers. But there is a...Read More
FOCA PRO (VERSION FINAL 4.3) |herramienta de pentesting ,metadatos y mas 2 min read Videos FOCA PRO (VERSION FINAL 4.3) |herramienta de pentesting ,metadatos y mas PsYx Vlogs December 30, 2015 FOCA (Fingerprinting Organizations with Collected Archives) es una herramienta creada por el hacker español Chema Alonso y...Read More
432 – The Category5.TV Newsroom 1 min read Videos 432 – The Category5.TV Newsroom admin December 30, 2015 Elon knows when the Johnny Cab will arrive, North Korea is spying using Linux, Wireless charging is...Read More
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware 3 min read Videos Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware Black Hat December 30, 2015 by Christopher Kruegel & Yan Shoshitaishvili Over the last few years, as the world has moved closer...Read More
Exploiting XXE Vulnerabilities In File Parsing Functionality 1 min read Videos Exploiting XXE Vulnerabilities In File Parsing Functionality Black Hat December 30, 2015 by Willis Vandevanter In this 25-minute briefing, we will discuss techniques for exploiting XXE vulnerabilities in File...Read More
Best Antivirus for Windows 10: How to Secure Your PC 2 min read Videos Best Antivirus for Windows 10: How to Secure Your PC Andy Slye December 30, 2015 Best antivirus 2016 for Windows 7/8/10 BitDefender ► https://goo.gl/QvzmUz MalwareBytes ► http://bit.ly/1OZUXWy Blog post: http://mytechmethods.com/guides/best-antivirus-2016 If you’re...Read More
ProxyBack Malware Converts Your PC Into Proxy 2 min read Malware ProxyBack Malware Converts Your PC Into Proxy admin December 30, 2015 PALO ALTO NETWORKS RESEARCHERS HAVE IDENTIFIED A UNIQUE MALWARE THAT INFECTS HOME PCS AND TRANSFORMS THEM INTO...Read More
Android Malware Poses As Google App To Ditch Security Apps 2 min read Malware security Android Malware Poses As Google App To Ditch Security Apps admin December 30, 2015 Recently, security researchers at Symantec Corp identified a malware family that attacks Android devices located in China...Read More
CenoCipher – Easy-To-Use, End-To-End Encrypted Communications Tool 2 min read Pentest Tools CenoCipher – Easy-To-Use, End-To-End Encrypted Communications Tool admin December 30, 2015 CenoCipher is a free, open-source, easy-to-use tool for exchanging secure encrypted communications over the internet. It uses...Read More
DDoS mitigation may leave your site vulnerable 5 min read security Vulnerabilties DDoS mitigation may leave your site vulnerable admin December 30, 2015 The last thing upper management wants this time of the year is to receive an anonymous email...Read More
Post-Hack 4 Million New Members Added Says Ashley Madison 3 min read Cyber Attack | Data Breach News Post-Hack 4 Million New Members Added Says Ashley Madison admin December 30, 2015 Ashley Madison says it added 4 million members after hacking scandal The data breach in August has...Read More
Malware removal from Samsung Smartphone Android Ransomware , FBI , UKASH , POLICE 1 min read Videos Malware removal from Samsung Smartphone Android Ransomware , FBI , UKASH , POLICE SecureInc UK December 30, 2015 Ensure you backup your phone data on a regular basis , loading AntiVirus software is the best...Read More