Tranning - Hacking

All the blog posts about education and stuff

Collaborative Agreement Certifies Trust Among EU Agencies

Multiple cybersecurity organizations have signed a memorandum of understanding (MoU) aimed at enhancing cooperation on cybersecurity and defense, according to a press release from Europol. The European Union Agency for Network...

3 Charged In Fatal Kansas ‘Swatting’ Attack — Krebs on Security

Federal prosecutors have charged three men with carrying out a deadly hoax known as “swatting,” in which perpetrators call or message a target’s local 911 operators claiming a...

VPNFilter botnet has hacked 500,000 routers. Reboot and patch now!

At least half a million routers and storage devices in dozens of countries around the world have been infected by a sophisticated botnet, in preparation for an alleged planned cyber...

Office 365 will automatically block Flash and Silverlight

If you are one of the small number of Office 365 users who enjoyed embedding Flash, Shockwave or Silverlight content inside files, time is about to run out on your...

Amazon Comes Under Fire for Facial Recognition Platform | Threatpost

Facial-recognition technology has long been touted as a useful tool for law enforcement, but the ability of systems like Amazon’s Rekognition platform to identify large numbers of people at once...

Android Application Penetration Testing – Part 1

Android security testing is more often used by security industries to test the vulnerabilities in Android applications. After web applications, more concern area is mobile application penetration test Let’s start...

Font Steganography – Schneier on Security

Blog > Comments Subscribe to comments on this entry ...

Destructive ‘VPNFilter’ Attack Network Uncovered

More than 500K home/SOHO routers and storage devices worldwide commandeered in potential nation-state attack weapon - with Ukraine in initial bullseye.A newly unearthed novel and destructive cyberattack infrastructure made up...

Troy Hunt: New Pluralsight Course: Bug Bounties for Companies

Try publishing something to the internet - anything - and see how it long it takes before something nasty is probing away at it. Brand new website, new domain and...

Vulnerabilities in D-Link Routers Allows Hackers Gain Complete Control

Set of 4 Vulnerabilities are discovered in D-Link DIR-620 firmware that allows an attacker to exploit with the hardcoded default credentials to gain high privileged access to the firmware. D-Link routers are one...

APLICATIONS

Firefox locks down its future with HTTPS ‘secure contexts’ – Naked...

John E Dunn John E Dunn has covered cybersecurity since 2003, long before anyone was worried. He was co-founding editor of...

HOT NEWS