Hacking Mac With EmPyre
I am the stereotypical Apple fan boy that other bloggers write about. We have MacBook Pro’s, Air’s, Apple TV’s, iPhone’s and iPad’s and even subscribe to Apple Music. You literally couldn’tRead More →
I am the stereotypical Apple fan boy that other bloggers write about. We have MacBook Pro’s, Air’s, Apple TV’s, iPhone’s and iPad’s and even subscribe to Apple Music. You literally couldn’tRead More →
My article will tell you how to accept 10 million packets per second without using such libraries as Netmap, PF_RING, DPDK and other. We are going to do this withRead More →
Two years after its first version, osquery gets Windows port. Facebook’s insanely popular osquery project is now available for Windows after it was launched in 2014 with support for only MacRead More →
Short Bytes: At its Ignite conference, Microsoft announced Windows Defender Application Guard for its Edge Browser. This technology will run Edge in a lightweight virtual machine, isolating it from theRead More →
Short Bytes: More and more things are getting connected to the internet. Apart from its advantages, it also raises a concern regarding these things becoming prone to hackers. A DARPA-ledRead More →
Kaspersky Lab presented an investigation on the future of ATM Biometric Skimmers and how cybercriminals could exploit them. A recent investigation by Kaspersky Labs reports that a number of undergroundRead More →
The Dridex banking trojan might be involved in fewer attack campaigns, but its developers are still outfitting it with some new functionalities, including the ability to target crypto-currency wallets. NicholasRead More →
First off, this is dead simple and shouldn’t work, but it does. Also, there is no possible way that I’m the first one that has identified this, but here itRead More →
Researchers at MIT’s artificial intelligence labs have developed new algorithms that could significantly boost bandwidth and network quality. Researchers at MIT claim to have created a network-boosting technology that couldRead More →
Beijing hopes satellite will create communications system with significant military and commercial applications. China says it has launched the world’s first quantum satellite, a project Beijing hopes will enable itRead More →
What do spies use to chat online? A terribly ugly Windows programme. At least, that’s what the Five Eyes intelligence alliance (made up of the US, UK, Australia, New Zealand andRead More →
A new Windows Activation scam has been discovered by Malwarebytes security researcher Pieter Arntz. When I installed the sample, I discovered that this PC Tech Support scam, like many others recently,Read More →
“Off-path” attack means hackers can be anywhere with no man-in-the-middle needed. Computer scientists have discovered a serious Internet vulnerability that allows attackers to terminate connections between virtually any two partiesRead More →
Short Bytes: Google Hacking is the method to access information that’s publicly available, but not intended for public distribution. Using certain intelligent search techniques, one can land unexpected results onRead More →
GCHQ’s JTRIG team targeted more than hacktivists. Mustafa Al-Bassam, aka tFlow, co-founder of the LulzSec hacking crew, published today more details about how the GCHQ used the covert Joint Threat ResearchRead More →
Short Bytes: Password cracking is an integral part of digital forensics and pentesting. Keeping that in mind, we have prepared a list of the top 10 best password cracking toolsRead More →
In part one of our web shell series we analyzed recent trends, code bases, and explored defensive mitigations. In part two we investigate a new web shell created by Chinese-speakingRead More →
The U.S. government’s reach got a little bit shorter Thursday when the Second Circuit Court of Appeals reversed a lower court decision and ruled that the U.S. government can’t forceRead More →
Short Bytes: If you want to see how easy it is for an expert hacker to take complete control of your computer, you are at the right place. In aRead More →
Seven Pentagon supercomputers are getting ready to attack one another. Look out, human hackers. Pentagon research agency DARPA says people are too slow at finding and fixing security bugs and wantsRead More →