Category: Hacking

Dark Web Access

Dark Web Access Do you wish to enter into the world of darkness? – The Dark Web. Then make sure you are protected and safe with the VPN to remain anonymous online. If you aren’t connected with the Best VPN, then you may land in trouble even if you are using Tor browser. First, set…
Read more

Web Vulnerability Scanners

Web Vulnerability Scanners Netsparker Application Security Scanner — Application security scanner to automatically find security flaws. Nikto — Noisybut fast black box web server and web application vulnerability scanner. Arachni — Scriptableframework for evaluating the security of web applications. w3af — Webapplication attack and audit framework. Wapiti — Blackbox web application vulnerability scanner with built-in…
Read more

How To Become A Cyber Security Specialist

How To Become A Cyber Security Specialist. You have been reading the news about all the recent cyber-attacks, you have an interest in computers and you want to embark on a new career as a cyber security professional. Where do you start? There are 3 major paths you can take to further your career in…
Read more

What is Cryptography

What is Cryptography Cryptography is the art of converting text into another form for secret transmission and reception. It works by converting plain text into cipher text using some encryption algorithm at the sender’s side and converting ciphertext into plain text at the receiver’s. Cryptography is used to provide confidentiality, integrity, authenticity and non-repudiation. Key…
Read more

White Hats

White Hats A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers, white hat hackers respect the rule of law as it applies to hacking. White hat hackers, also called ethical hackers, only seek vulnerabilities or exploits when they are…
Read more

Black Hat

Black Hat Black hat refers to a hacker who breaks into a computer system or network with malicious intent. A black hat hacker may exploit security vulnerabilities for monetary gain; to steal or destroy private data; or to alter, disrupt or shut down websites and networks. The black hat hacker may also sell these exploits…
Read more

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ

Hᴏᴡ Tᴏ Rᴇᴘᴀɪʀ Cᴏʀʀᴜᴘᴛᴇᴅ Mᴇᴍᴏʀʏ Cᴀʀᴅ/USB Pᴇɴ Dʀɪᴠᴇ Tʜᴇ Mᴇᴛʜᴏᴅ ɪs ʙᴀsᴇᴅ ᴏɴ ᴀɴ ᴜɴᴄᴏᴍᴘʟɪᴄᴀᴛᴇᴅ ᴄᴏᴍᴍᴀɴᴅ ᴘʀᴏᴍᴘᴛ ᴛʀɪᴄᴋ ᴛʜᴀᴛ ᴡɪʟʟ ғᴏʀᴄᴇ ғᴏʀᴍᴀᴛ ʏᴏᴜʀ ᴇxᴛᴇʀɴᴀʟ ᴅʀɪᴠᴇ, ᴀɴᴅ ᴛʜᴇɴ ʏᴏᴜ ᴄᴀɴ ᴜsᴇ ɪᴛ sᴍᴏᴏᴛʜʟʏ ᴀɴᴅ ᴇʀʀᴏʀ-ғʀᴇᴇ. Hᴏᴡᴇᴠᴇʀ, ɴᴏᴛᴇ ᴛʜᴀᴛ ᴛʜɪs ᴡɪʟʟ ᴅᴇʟᴇᴛᴇ ᴀʟʟ ʏᴏᴜʀ ғɪʟᴇs ғʀᴏᴍ USB ᴘᴇɴ ᴅʀɪᴠᴇ ᴀɴᴅ ɪғ ʏᴏᴜ ʜᴀᴠᴇ ᴀɴʏ ɪᴍᴘᴏʀᴛᴀɴᴛ ᴅᴀᴛᴀ, Tʜᴇɴ…
Read more

Ethical Hacking

Ethical Hacking and ethical hacker are terms used to describe hacking performed by a company or individual to help identify potential threats on a computer network. What constitutes ethical Hacking ? For hacking to be deemed ethical,the hacker must obey the following rules: Expressed permission to probe the network and attempt to identify potential security…
Read more

Security Strategies in the Digital World

Common Sense Security Strategies in the Digital World You’ve been Hacked! Pwned! Account Compromised. Bank account emptied. Credit cards were stolen and sold on the dark web. Facebook account hacked, now inappropriate messages or videos sent to your friends and family members. New accounts and credit cards opened in your name. Or worse, you’re on…
Read more

Calibration Fingerprinting Attack

Calibration Fingerprinting Attack We have developed a new type of fingerprinting attack, the calibration fingerprinting attack. Our attack uses data gathered from the accelerometer, gyroscope and magnetometer sensors found in smartphones to construct a globally unique fingerprint. Overall, our attack has the following advantages: The attack can be launched by any website you visit or…
Read more