Kali Linux from Microsoft Store and use on Windows 10
Thanks to Microsoft who a few months ago vowed to bring open source software to its store, now you can download Kali Linux and install it on Windows 10 KaliRead More →
Thanks to Microsoft who a few months ago vowed to bring open source software to its store, now you can download Kali Linux and install it on Windows 10 KaliRead More →
A flight of new research papers show 4G LTE networks can be exploited for all sorts of badness. There have been lots of reasons to be concerned about how easilyRead More →
Hijacker is a Graphical User Interface for the penetration testing tools Aircrack-ng, Airodump-ng, MDK3 and Reaver. It offers a simple and easy UI to use these tools without typing commandsRead More →
Open Bug Bounty consists of a team of no more than 10 researchers from several countries with backgrounds in IT, cyber security and law, who work to verify vulnerabilities, promptly notify websiteRead More →
Winter Olympics officials have confirmed that a cyberattack occurred during the games’ opening ceremony on Feb. 9, but are remaining mum on the source of the attack. Researchers say theRead More →
Hacking just got fully automated for script kiddies. Hacking isn’t always hard. Some lower-tier hackers use programs to automatically churn through breached login details to break into other accounts, and some penetrationRead More →
Recently members of the Fidus team noticed an interesting blog post on the OnePlus forum by an individual discussing recent fraudulent attempts made on two of their credit cards. The forum userRead More →
Security analysis and penetration testing is an integral part of creating any kind of secure network. This brings us to the WiFi hacking software that could be used for ethicallyRead More →
Group-IB has uncovered a hacker group attacking banks in the USA and Russia. In less than two years, this group has conducted over 20 successful attacks on financial institutions andRead More →
A flaw in certificate pinning exposed customers of a number of high-profile banks to man-in-the-middle attacks on both iOS and Android devices. A vulnerability in the mobile apps of majorRead More →