Search
Monday 23 October 2017
  • :
  • :

Archives post

Τα 10 καλύτερα Wi-fi Hacking Tools για το 2017

  Μερικές φορές, όταν βρίσκεστε σε ένα δίκτυο, θέλετε να ελέγξετε τι...

BitCracker – BitLocker Password Cracking Tool (Windows Encryption Tool)

BitLocker is a full-disk encryption feature available in recent Windows versions (Vista, 7, 8.1 and 10) Pro and Enterprise. BitCracker is a...

R6DB hacked. Rainbow Six Siege service’s database wiped and held for ransom

R6DB online gaming service that provides statistics for Rainbow Six Siege gamers, was hit by hackers who wiped its database and held the...

Κοινές crypto-απάτες και πώς να τις αποφύγετε!

Τελευταία ακούμε συνέχεια για απάτες στο χώρο των κρυπτονομισμάτων. Νέοι...

Information Security Forum Releases General Data Protection Regulation Implementation Guide

The Information Security Forum (ISF) today announced the release of the ISF GDPR Implementation Guide, the organizations latest digest...

Senate Passes MAIN STREET Cybersecurity Act for Small Business

The U.S. Senate has passed the MAIN STREET Cybersecurity Act on Sept. 28, which will require NIST to “disseminate clear and concise...

Hikvision Security Cams Compromised to Display “HACKED”

If you own Hikvision security cameras you would have noticed the sudden change in the live feed display where the normal footages were...

Who Knows Your (Sex) Secrets? Internet of Sex Toys

Security researchers with Pen Test Partners have discovered a vulnerability in the Lovense Hush sex toys, an IoT-enabled butt plug. The...

60% of institutions in Saudi Arabia hit by malware-based attacks

According to Kaspersky Lab, sixty percent of institutions in Saudi Arabia have experienced malware-based attacks over the past 12 months....

Vxers abused legitimate VMware binary to spread Banking Trojan Distribution

Cisco researchers discovered a malware campaign abusing a legitimate VMware binary to spread a banking Trojan. The threat actor behind...

High-severity flaw opens Siemens Industrial Switches to attacks

Siemens has started releasing security patches to fix a high severity access control vulnerability in its industrial switches tracked as...

Phish For The Future – spear-phishing attacks target Internet Freedom Activists

EFF published the report on “Phish For The Future,” an advanced persistent spearphishing campaign targeting Freedom Activists. The...

Millions of Macs open to EFI Firmware Hacks even if they are up-to-date

A group of researchers with Duo Security demonstrated that millions of Up-to-Date Apple Macs are vulnerable to EFI Firmware attacks. In...

Crooks spreads backdoor devised as a security WordPress Plugin

Experts from Sucuri discovered crooks are spreading a fake WordPress plugin dubbed X-WP-SPAM-SHIELD-PRO containing a backdoor. A fake...

Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks

“Always keep your operating system and software up-to-date.” This is one of the most popular and critical advice that every...

FBI: δεν θα αναφέρει την πηγή για το hacking του iPhone

Το FBI δεν θα αναγκαστεί να αποκαλύψει λεπτομέρειες για ένα εργαλείο hacking που...

Anonymous Greece vs ιστοσελίδας πλειστηριασμών

Οι Anonymous Greece προσκαλούν την παγκόσμια κοινότητα των Anonymous για υποστήριξη σε...

Facebook: εύκολος στόχος για hackers οι χρήστες social media της Νότιας Αφρικής

Η ψηφιακή παιδεία μεταξύ των κοινών ανθρώπων αποτελεί μεγάλη ανησυχία σε...

Illusion Gap παρακάμπτει το Windows Defender

Illusion Gap vs Windows Defender: Ερευνητές ασφαλείας της CyberArk ανακάλυψαν μια νέα τεχνική...

Code Pulse: a real-time code coverage tool for penetration testing activities

Code Pulse Code Pulse is a code coverage tool that works on running programs in real time. It uses the bytefrog tracing framework to...

hakkuframework: Hakku Framework penetration testing

Hakku Framework What is Hakku Framework? Hakku is a simple framework that has been made for penetration testing tools. Hakku framework...

reversemap: Analyse SQL injection attempts in web server logs

reversemap Analyse SQL injection attempts in web server logs The program can either be run in batch mode or interactive mode. In batch...

VNC Penetration Testing

Welcome to Internal penetration testing on VNC server where you will learn VNC installation and configuration, enumeration and attack,...

Tails 3.2 – Live System to Preserve Your Privacy and Anonymity

  Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent...

Security+: Threats and Vulnerabilities

Introduction Threats and vulnerabilities fall into the third domain of CompTIA’s Security+ exam (SYO-401) and contribute 20% to the exam...

Security+: Network Security

Introduction Network security falls into the first domain of CompTIA’s Security+ exam (SYO-401) and contributes 20% to the exam score....