Technology - Hacking

Technology news and blogs

The Simulated Phishing Market Enters Early Adolescence

By Perry Carpenter,  KnowBe4 Chief Evangelist and Strategy Officer   We certainly live in fun times: Barracuda acquiring PhishLine Microsoft adding phishing simulation to Office 365 Yesterday’s announcement by Proofpoint of their intent to acquire Wombat Security...

How To Hack Website Using SQLMAP On Android Without Root : Step-By-Step Tutorial

Hello everyone, today I am going to show you how to install SQLMAP on Android without root permission and hack website with SQL injection. If you don’t know about SQL Vulnerability & SQL...

Gas Is Too Expensive; Let’s Make It Cheap!

A few months ago, while undertaking unrelated research into online connected devices, we uncovered something surprising and realized almost immediately that we could be looking at a critical security threat....

TerryCutler blog selected by Feedspot panelists as one of the Top 75 Hacker Blogs...

Hacker Blogs List I would like to personally congratulate you as your blog Terry Cutler has been selected by our panelist as one of the Top 75 Hacker Blogs on the...

An Introduction to Use After Free Vulnerabilities

Use After Free (UAF) vulnerabilities are a class of memory corruption bug that have been very successful in the world of browser exploitation. In recent browser versions a number of...

KnowBe4 Fresh Content Update & New Features Summary Jan 2018

A lot of new modules have been added to the KnowBe4 ModStore: We refreshed 26 Language versions for our 15 min KMSAT course. (Available now). 20 language versions for Ransomware will be...

Hack Any Android Over Internet Using Metasploit Part : 2

Hacking Android With Metasploit! We’ve discussed how to create Metasploit payload and how to configure your Linux to NOIP account for DDNS in First Part of this series In this second and...

BSides NYC, a volunteer organized event put on by and for the community

Another edition of BSides NYC has passed, and as first time attendee and presenter, I was genuinely impressed with the impeccable organization, the content shared, and the interesting conversations that...

Equifax Hack-Attack interview on the Jewel 106.7FM

Kris Leblanc and I discuss the Equifax hack along with other scams, and what you can do about it.  ... The post Equifax Hack-Attack interview on the Jewel 106.7FM appeared first...

Top Ten Web App Security Issues of 2016

Back in 2014 Pure Hacking conducted an analysis based on web application penetration tests we had performed and looked at the top vulnerability classes we encountered. As we are a...

APLICATIONS

HOT NEWS