How to Hack Smartphones
More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but alsoRead More →
Data Security News | Infosec Blog | Information Security Tutorials
More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but alsoRead More →
A lot of people think that TOR services are unhackable because they are on a “secure environment”, but the truth is that those services are exactly the same that runRead More →
The poorly thought-out and crude surveillance technique could have a devastating effect on the country’s internet security. In less than a month, Kazakhstan will begin enforcing a new law thatRead More →
Surreptitious attacks often prey on people visiting legitimate sites. A new wave of crypto ransomware is hitting Windows users courtesy of poorly secured websites. Those sites are infected with Angler,Read More →
The goal of BDF is to patch executable binaries with user desired shellcode and continue normal execution of the prepatched state. First of all download the-backdoor-factory-master from here. Now unzipRead More →
The Chinese Government says it has arrested the hackers responsible for breaching the Office of Personnel Management database (OPM). The Chinese government has arrested hackers accused of breaking into theRead More →
Microsoft has started to offer potentially unwanted application (PUA) protection in its anti-malware products for enterprise firms. The news means that businesses will finally have an easy way of removingRead More →
ig brands are asked to pay royalties for usage of HTTPS A Texas company filed over 60 lawsuits against big brands that utilize HTTPS on their Web servers, arguing itRead More →
I intended originally for this series to contain only three posts, and in order to achieve that, this post is longer than anticipated. Here is a table of contents forRead More →
Researchers have found that thousands of Internet gateways, routers, modems and other embedded devices share cryptographic keys and certificates, exposing millions of connections to man-in-the-middle attacks that open the doorRead More →