Home General

General

Everything general about this

Pwn2Own Duo Hacks a Tesla – So They can Win it!

Posted on March 25, 2019 at 11:12 AM A pair of security researchers have hacked a Tesla Model 3 and drove away in their prize for the last day of Pwn2Own Vancouver. In...

Let’s spin Facebook’s Wheel of Misfortune! Clack-clack-clack… clack… You’ve won ‘100s of millions of...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook today admitted it stored “some” of its addicts’ account passwords in a plaintext...

I Still Didn’t See What You Did

More advice for detecting and avoiding sextortion scams Vox Emptoris: “Voice of the Customer” In my previous post, we examined a particular example of a sextortion scam, showing several indications that it was...

Two white hats hack a Tesla, get to keep it

The electric automaker is working to release a fix for the underlying vulnerability in a matter of days A duo of white-hat hackers have earned themselves a brand new Tesla Model...

Intelligence Tool to Capture & Analyze Windows Events Log

SilkETW is a flexible tool aimed to reduce the complexities of ETW(Event Tracing for Windows) and to put actionable data in the hands of researches on both the defensive and...

Let’s spin Facebook’s Wheel of Misfortune! Clack-clack-clack… clack… You’ve won ‘100s of millions of...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook today admitted it stored “some” of its addicts’ account passwords in a plaintext...

Operation ShadowHammer | Securelist

Earlier today, Motherboard published a story by Kim Zetter on Operation ShadowHammer, a newly discovered supply chain attack that leveraged ASUS Live Update software. While the investigation is still in progress...

Two white hats hack a Tesla, get to keep it

The electric automaker is working to release a fix for the underlying vulnerability in a matter of days A duo of white-hat hackers have earned themselves a brand new Tesla Model...

Intelligence Tool to Capture & Analyze Windows Events Log

SilkETW is a flexible tool aimed to reduce the complexities of ETW(Event Tracing for Windows) and to put actionable data in the hands of researches on both the defensive and...

Let’s spin Facebook’s Wheel of Misfortune! Clack-clack-clack… clack… You’ve won ‘100s of millions of...

Institute For Ethical Hacking Course and Ethical Hacking Training in Pune – India Extreme Hacking | Sadik Shaikh | Cyber Suraksha Abhiyan Credits: The Register Facebook today admitted it stored “some” of its addicts’ account passwords in a plaintext...

APLICATIONS

Lone Hacker Takes Dark Web Host Offline, Killing 10K .onion Domains...

Friday morning, a lone hacker claiming to be part of the Anonymous hacking group, took down one of the dark webs most prominent...

HOT NEWS