HackDig : Dig high-quality web security articles for hacker

New Tool Release: NPS_Payload

Over the past year, we have seen a lot of research come out which highlights several of Microsoft’s native binaries which can be leveraged by an attacker to compromise or gain access to a system. One of these binaries, msbuild.exe, has proven very reliable in allowing us to gain a shell on a host in a post-exploitation scenario. Casey Smith (@subtee) wrote
Publish At:2017-07-24 07:00 | Read:620 | Comments:0 | Tags:Articles

Social-Engineer Toolkit (SET) v7.7 “Blackout” Released

TrustedSec is proud to announce a major release of the Social-Engineer Toolkit (SET) v7.7. This version incorporates support for hostnames in the HTA attack vector, and a redesigned Java Applet attack vector. Java is still widely used in corporations and with a valid code signing certificate can be one of the easiest ways to get a shell in an organization. I
Publish At:2017-07-21 05:00 | Read:400 | Comments:0 | Tags:Articles

RSAC 2017 Ransomware Summit

Nobody likes to think about their company’s critical data being compromised and held for ransom. Unfortunately, this type of threat, dubbed ransomware, cannot be ignored. In the first quarter of 2016 alone, CNN projected that cybercriminals collected more than $200 million through ransomware attacks.   This would make ransomware a nearly $1 billion busi
Publish At:2017-01-10 08:10 | Read:906 | Comments:0 | Tags:Articles News

Six tips for practicing safe social media

With Facebook now counting over 1.7 billion monthly users and LinkedIn another 467 million, it was only a matter of time until criminal hackers turned their attention to exploiting social media as an attack vector. The current attack is being waged to introduce ransomware into these environments. Dubbed “Imagegate”, it’s a clever way of sneaking malware into
Publish At:2016-12-09 15:50 | Read:1362 | Comments:0 | Tags:Articles Featured news backup social networking tips

Useful steps to Install Linux Mint on your PC

Guest Post by Oliver. Linux Mint is one of the most powerful and elegant Operating system. The purpose of launching a Linux Mint in the market is to provide the modern and comfortable OS which is easy to use for every user. The best thing about Linux Mint is that it is both free and Open Source. Also, it comes at the third position after Microsoft Windows an
Publish At:2016-11-19 20:55 | Read:2651 | Comments:0 | Tags:Articles Guides installation linux mint rosa

Are You Prepared for a Catastrophic Data Loss?

If you walked into the office this morning to find that your customer information had been compromised, or a disgruntled employee had wiped a database clean, would you be prepared? Have you set preventative measures in place to safeguard you against total loss? Do you have security features in place to help you retrieve lost data? Are you able to continue wi
Publish At:2016-11-19 20:55 | Read:1263 | Comments:0 | Tags:Articles backup computers Encryption security simple softwar

Why Smartphone Apps Will Help Home Automation Thrive

Guest post by Emma. Home automation technology has struggled to gain serious traction because, for all its promised convenience, the current tangle of cords and communication standards still has consumers in knots. New quote-unquote-smart systems have made huge strides recently, but not everyone has chosen invest – yet. Totally “smart” homes still await the
Publish At:2016-11-19 20:55 | Read:1528 | Comments:0 | Tags:Articles home automation operating systems smartphone Vivint

Paas and continuos integration

Today I want to repost a great article first posted on sysadvent blog. I think it’s a great post that show how to integrate different software to achieve a modern continuos integration. Original article by: Written by: Paul Czarkowski (@pczarkowski) Edited by: Dan Phrawzty (@phrawzty) Docker and the ecosystem around it have done some great things for d
Publish At:2016-11-19 20:55 | Read:2539 | Comments:0 | Tags:Articles Guides alias continuos integration ghost infrastruc

How Linux has Advanced Computer Technology and Everyone Wins as a Result

If you were to ask the average person about Linux, it’s likely you would get either a blank stare or a reply about an operating system that a bunch of anti-Microsoft geeks like to use. Both responses are unfortunate misconceptions. Linux has never been more in the mainstream than it is today, and it plays a very important role in advanced computing tec
Publish At:2016-01-23 08:45 | Read:1264 | Comments:0 | Tags:Articles Opinion internet of things linux

Top Five Mobile Devices That Run Linux

Article submitted by Mark In a market that is churning Android powered device after another Android powered device and the obligatory Apple update to its iPhone and iPad brands, it is no wonder people need to look elsewhere if they want to experience something different in the mobile segment. We aren’t really disrespecting Apple and Google’s effo
Publish At:2015-12-24 23:30 | Read:1886 | Comments:0 | Tags:Articles Guides phone smartphone tizen ubuntu

Should You Use a VPN With Linux?

Article By Cassie Philips. Linuxaria has been one of my go-to sources for Linux tips and information ever since I discovered it a couple of months ago. I would strongly suggest reading this post on managing processes with cgroup, as it is an example of the quality of their content. Linux being one of the quickest rising operating systems available to compute
Publish At:2015-11-17 07:25 | Read:1725 | Comments:0 | Tags:Articles Guides data gnu/Linux linux privacy security VPN

Magento Remote Code Execution Vulnerability!

Salam, Hello, Nekhaw, Selamat Datang, Komastaka, Aregato, Ciao, Merhaba, Swadi Kup, Namaste, Kak Gatokha Bratokha Wherever you are from, Welcome to this blog post about a Remote Code Execution Vulnerability that affects the most popular shopping application on the internet –> #MagentoThe case started when i found below sub-domain for Magento.com we
Publish At:2015-10-29 13:35 | Read:1647 | Comments:0 | Tags:Articles Vulnerability

Why Computer Information Science Majors Should Use Linux

Guest Post By Ravinder CIS students earn a skill set that applies to a range of lucrative careers in IT. Data architects, software development managers and program managers are among dozens of CIS positions with a mid-career salary that is greater than $120,000. Compared to other disciplines, job prospects are healthy for CIS majors – especially when they co
Publish At:2015-10-01 12:00 | Read:1525 | Comments:0 | Tags:Articles Opinion CIS linux operating systems programming why

Sarah McKune authors blog on UN human rights and cybersecurity mechanisms

In a blog post for the Freedom Online Coalition Working Group on “An Internet Free and Secure” (WG1), Citizen Lab Senior Legal Researcher Sarah McKune explores the link between cybersecurity and the United Nations’ human rights mechanisms. The blog series of WG1 seeks to explore various non-conventional spaces in which cybersecurity issues
Publish At:2015-05-08 06:05 | Read:1000 | Comments:0 | Tags:Articles Research News Sarah McKune Cybersecurity Human Righ

Sarah McKune on Encryption, Anonymity and the Right to Science

Citizen Lab Senior Legal Researcher Sarah McKune wrote an article in Just Security, entitled “Encryption, Anonymity and the Right to Science,” in which McKune calls for the encryption and anonymity debate to address the aspects of human rights that are unique to digital space. She emphasizes the need to recognize that the ability to do science is
Publish At:2015-05-08 06:05 | Read:1518 | Comments:0 | Tags:Articles Research News Sarah McKune Encryption Privacy Secur


Share high-quality web security related articles with you:)


Tag Cloud