Thursday, September 20, 2018

Tranning - Hacking

All the blog posts about education and stuff

Insights on the Capabilities of Three Politically-Themed Ransomware Campaigns

We all hear politicians’ names week over week – what policies they’re working on, new initiatives they’re implementing for their respective country, the list goes on. And now, we’re hearing...

Wi-Fi Devices Can be Used to Detect Weapons and Bombs

Dangerous Objects such as weapons, Bombs, and chemicals that are hidden in baggage can be detected with Wi-Fi signals from normal Wi-Fi devices without opening it. Researchers from Rutgers University demonstrated...

Political Figures Differ Online: Names of Trump, Obama, Merkel Attached to Ransomware Campaigns

Politics and ransomware. No, it’s not a lost single from the Oasis back catalogue, but in fact a relatively recent tactic by ransomware developers looking to exploit the profiles of...

Understanding Windows Event logs for Cyber Security Operations Center

Cyber Security operations center is protecting organizations and sensitive business data of customers. It ensures active monitoring of valuable assets of business with visibility, alerting and investigating threats and a...

GovPayNow.com Leaks 14M+ Records — Krebs on Security

Government Payment Service Inc. — a company used by thousands of U.S. state and local governments to accept online payments for everything from traffic citations and licensing fees to...

Wannamine Malware Still Penetrate the Unpatched SMB Computers

Cryptomining based Wannamine malware outbreak still actively attacking the windows users around the globe that using NSA exploit Eternalblue to penetrate the unpatched SMB enabled computers to gain high privileged access. Eternalblue Exploit...

Why kids love it and what parents need to know

  Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded the game and it’s estimated that 3.4 million play it monthly....

Hackers Spreading new Malware with Powerful Obfuscation Technique

Researchers discovered new malware sample that is using different obfustication technique to change the overall signature when its delivery the final payload to evade the most of the anti-virus products. Attackers...

Why kids love it and what parents need to know

  Fortnite: Battle Royale is the hottest video game for kids right now. More than 125 million people have downloaded the game and it’s estimated that 3.4 million play it monthly....

2B Bluetooth Devices are Still Vulnerable to BlueBorne Attack After 1 Year

A recent report revealed that more than 2 Billion Bluetooth Devices are still vulnerable to BlueBorne Attack even after 1 year later since the patch has been released. A most dangerous...

APLICATIONS

These are the prototyping tools to use in 2017

Advertise here via BSAWhat is the beauty of having a top-quality prototyping system at your disposal? We know – you may have no...

HOT NEWS