The GDPR Basics: What Consumers Need to Know

What companies do with consumer data has always been a hot topic – and becomes hotter after every security breach, when consumers learn more about what can go wrong with...

Google Dorks List 2018 For Ethical Hacking and Penetration Testing

Google Dorks List “Google Hacking” is mainly referred to pull the sensitive information from Google using advanced search terms that help users to search the index of a specific website,...

EtherDelta Hacked – Millions Stolen

Update 10 Jan 2018 : EtherDelta has not been hacked again, what you heard was probably rumors. MyEtherWallet is also not hijacked. If you are not sure about a hack you...

Official Black Hat Arsenal Security Tools Github Repository released

Dear all, We are happy to announce the immediate availability of the official Black Hat Arsenal Tools Github repository. It is mainly oriented for security tools that has been presented...

17 year old school boy arrested for Creating Malware

A 17-year-old schoolboy arrested by Japanese police expecting to be the author of a Malware that steals Cryptocurrency Monacoin wallet Private key passwords. He targetted Monacoin a cryptocurrency based on...

Attackers Exploiting Unpatched Flaw in Flash — Krebs on Security

Adobe warned on Thursday that attackers are exploiting a previously unknown security hole in its Flash Player software to break into Microsoft Windows computers. Adobe said it plans...

Marcher Malware Uses Both Credential and Credit Card Phishing to Steal Financial Data

Actors turned models turned singers — pretty much the definition of a “triple threat” in the entertainment industry. However, the definition changes a bit for the cybersecurity space, as Android...

Cracking WPA with oclHashcat GPU on Windows

In this tutorial we’re going to crack the WPA/WPA2 wireless network key using oclHashcat on Windows. Instead of using CPU power to brute force the password we’re going to use the GPU’s,...

How To Hack Facebook Account : Tutorial [Part 1]

Hi folks today I will demonstrate to you industry standards to hack Facebook utilizing phishing strategy. There are numerous different ways too you can discover them here fb hacking techniques! Be that...

Smart, Smarter… Dumbest…

While the evolution of new smartphones creates more possibilities for the user, these new devices also creates more possibilities for hackers. The post Smart, Smarter… Dumbest… appeared first on WeLiveSecurity Source link...

LATEST NEWS

MUST READ