Isolating a PC from the Internet is useless against the hackers
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique was used to write the script of theRead More →
Data Security News | Infosec Blog | Information Security Tutorials
A technique widely used to avoid hacking a computer is to isolate it completely from the network, known as air-gapped. This technique was used to write the script of theRead More →
Google has been rewarding for years for finding vulnerabilities in some of its products. Having started the program in November of 2010, the company has recognized that it has paidRead More →
The 21-year-old has been jailed for running a botnet and selling malware in the Dark Web. A 21-year-old has been jailed for two years after being convicted of launching DDoSRead More →
While helping a large organization with improving their overall security posture, I came across an interesting endpoint which I have never come across before. It immediately sparked my interest. TheRead More →
Some weeks ago I read about this Starbucks case where hackers hijacked laptops on the WiFi network to use the devices computing power to mine cryptocurrency, and I thought it might beRead More →
As the values of the largest cryptocurrencies have multiplied, so too have reports of digital-currency miners stealing resources to increase the profitability of their operations. Few weeks back, we reportedRead More →
OSPF (Open Shortest Path First) is a link state routing Protocol, a type of the Internal Gateway Protocol (IGP), which was designed to scale and support more extensive networks. To findRead More →
Security analysis and penetration testing is an integral part of creating any kind of secure network. This brings us to the WiFi hacking software that could be used for ethicallyRead More →
THE FEDERAL COMMUNICATIONS Commission voted Thursday to dismantle its net neutrality regulations. But that won’t end the fight over rules that prohibit internet service providers from creating fast lanes for some content, whileRead More →
In my post about how insecure AppLocker really are we concluded that the only valid bypass technique (from the 7 I tested) was actually msbuild.exe. The next question is, how can weRead More →