This Cybersecurity Expert Took Down Healthcare.gov in 4 Minutes

If you enjoyed this, please share it with others!
Share this with others

David Kennedy of TrustedSec took only 4 minutes to breach the security of healthcare.gov It only took David Kennedy four minutes to hack into the Obamacare website and acquire 70,000 personal records. Kennedy could have gone on to acquire hundreds of…

If you enjoyed this, please share it with others!
Share this with others

[TUTORIAL] Building Virtual Machine on Linux Operating System

If you enjoyed this, please share it with others!
Share this with others

Virtual machine is a machine or computer that are running virtually on a computer. It’s like we have another computer in one computer. Virtual machine has a lot of functions. For example, if you want to run an application, but it can only work on another…

If you enjoyed this, please share it with others!
Share this with others

How to Remove Malware From Your Windows PC

If you enjoyed this, please share it with others!
Share this with others

Step 5: Fix Your Web Browser Malware infections can damage Windows system files and other settings. One common malware trait is to modify your Web browser’s homepage and/or connection settings to reinfect the PC, display advertisements, prevent…

If you enjoyed this, please share it with others!
Share this with others

7 Chilling Ways the NSA Can Spy On You

If you enjoyed this, please share it with others!
Share this with others

If the news, or perhaps more accurately Russian propaganda, is to be believed,  spy gear for U.S. covert operatives  consists of an ill-fitting wig or two, sunglasses, a paper map, a compass, and a pocket knife; the items found on Ryan C. Fogle…

If you enjoyed this, please share it with others!
Share this with others

1Password for Mac Gets a Massive Update

If you enjoyed this, please share it with others!
Share this with others

1Password for Mac has received a ‘massive update’ that includes numerous new features and improvements. 1Password creates strong, unique passwords for every site, remembers them all for you, and logs you in with a single tap. Alongside the application…

If you enjoyed this, please share it with others!
Share this with others

OpenSSL Heartbleed bug and Exchange Server vulnerability

If you enjoyed this, please share it with others!
Share this with others

There is a news out there about the heartbleed flaw in OpenSSL and how it could affect email servers and web servers on the Internet. Exchange relies on SSL certificates so let’s break this down and ensure our servers aren’t vulnerable to attacks. Good…

If you enjoyed this, please share it with others!
Share this with others

War Dialing Returns in 2014 – Modem and VOIP Security

If you enjoyed this, please share it with others!
Share this with others

For anyone who hasn’t seen the movie WarGames, you may not know what war dialing is. Some of you might know about war dialing, but wrongly assume that it’s an outdated hacking method that doesn’t even work nowadays. Either way, I encourage you to check out this information-packed article on war dialing and how it [...]

If you enjoyed this, please share it with others!
Share this with others

Penetration Testing 101 – Part 2 – White Box Testing

If you enjoyed this, please share it with others!
Share this with others

White Box Testing – A Quick And Dirty Overview Wireless security experts and those aspiring to become one should be familiar with white box testing both as a concept and also the tactics of how to successfully carry out and document a white box penetration test. If you haven’t seen the article on black box [...]

If you enjoyed this, please share it with others!
Share this with others

Rainbow Tables and Dictionaries – What Are They?

If you enjoyed this, please share it with others!
Share this with others

Find out more about rainbow tables: The Rise of Rainbow Tables A rainbow table is a precomputed look up table for reversing cryptographic hash functions. Rainbow tables are mostly used to crack encrypted password hashes. They can potentially speed up the process of cracking passwords. In fact, they have the possibility of speeding up the password cracking process exponentially. Why is [...]

If you enjoyed this, please share it with others!
Share this with others

Penetration Testing 101 – Black Box Testing

If you enjoyed this, please share it with others!
Share this with others

What is Black Box Testing? This is the first part of a 3-part series on penetration testing methodologies and techniques. We’re going to cover the 3 distinct forms of penetration testing: black box testing, white box testing, and gray box testing. You may already know what black box testing is, but I still would encourage [...]

If you enjoyed this, please share it with others!
Share this with others

How Do You…? Enable WiFi Kali Linux

If you enjoyed this, please share it with others!
Share this with others

One of the most popular Internet search terms is “enable WiFi Kali Linux” and there’s no mistaking why. One of the most popular operating systems that IT Security Professionals and Penetration Testers use is called Kali Linux. Kali is a specialized, locked down Linux OS that comes preloaded with tons of security tools and utilities. [...]

If you enjoyed this, please share it with others!
Share this with others

Even Drones are Vulnerable to WiFi Attacks

If you enjoyed this, please share it with others!
Share this with others

WiFi attacks now affect drones! Who would have thought, right? As reported by newscientist.com software engineer named Samy Kamkar wrote a program called SkyJack that can easily hack and take control of drones. He’s got an awesome YouTube video below that you should check out. Many drones are controlled via WiFi networks, so hopefully you can [...]

If you enjoyed this, please share it with others!
Share this with others

Kali Linux – Initial Setup and Configuration Guide

If you enjoyed this, please share it with others!
Share this with others

Kali Linux is fast becoming the number one operating system security professionals and penetration testers use during ethical hack engagements. You may have heard of or used Back Track, and the great thing about it is Kali Linux is simply the successor to Back Track. The same group of researches and security professionals maintain Kali, [...]

If you enjoyed this, please share it with others!
Share this with others