I write about ethical hacking, cybersecurity and digital privacy.
-
Making a google search in Linux via CLI is not a just a geek thing anymore, as Linux gaining popularity among normal people. Googler is a powerful, feature-rich and written in Python. This command line tool lets you access Google…
-
What are Top 10 Common Hacking Techniques?
We don’t need to explain why it is important to know what are the commonly used hacking techniques. Below is a list of top Top 10 Common Hacking Techniques. Keylogger Do you know one of the reasons why the online…
-
Not so “encrypted†cryptocurrency
Cryptocurrency has been the buzzword recently, with Bitcoin, Etherum, Ripple have all suddenly became the darlings of financial investors. The buzz surrounding the cryptocurrency pointed to the meteoric rise of Bitcoin from valuation of around USD950 in January 2017, to…
-
HackWareSprint
HackWareSprint – Hackathon in Singapore on 28-29 Jan 2018! More details coming soon ! For more tutorials, news, and resources on hacking and cybersecurity, visit our blog at DarkbyteGear.com.
-
Uber pays ransom to cover up cyberattack
Car-transportation application, Uber has fallen victim to a cyber-attack that resulted data breach of around 57 million riders and paid a handsome fee to cover up the incident. According to local media, Uber executives responded to the data breach of…
-
Top 10 Linux Distro for Ethical Hacking and Penetration Testing
Top 10 Linux Distro for Ethical Hacking and Penetration Testing. If you are pursuing a careers in infosec or working professionally in cyber security, surely you must have a good Linux distro that works best for you. The list below…
-
Battlefield: Online
Battlefield: Online. Forget about the troop amassing near North Korea’s border, the real battlefield nowadays is not putting boots on ground but rather gaining initiatives on the cyber world . This week, the team from Hackwarenews, saw some desperate hackings…
-
Malaysia sees biggest data breach at 46.2 million mobile information
Malaysia has become the latest victims of the telecom data breach that threatened to leak around 46.2 million postpaid and prepaid phone subscribers’ information. The alleged data breach is more than the overall population of Malaysia which recorded 32 million…
-
Lessons draw from Start-up Nation
Singapore is gearing up itself as the next start –up nation. Does this ring a bell in you? Yes, the tiny red dot is following the model of Israel, arguably the world’s best start up nation. As we put Israel…
-
Horangi: The Tiger that does not sleep
Paul Hadjy, co-founder and CEO of Horangi almost finds himself an endangered species in the tiny red dot at plying the rare trade of cyber-security. “It was cool to see some of the other companies doing cyber-security in the region…
Join 900+ subscribers
Stay in the loop with everything you need to know.