I write about ethical hacking, cybersecurity and digital privacy.
-
White hat hackers are known to be very helpful when it comes to finding a huge range of problems with computer systems. They also do all they can in order to fix any of those issues the best way they…
-
Port scanning or OS fingerprinting
Believe it or not! The fact is pretty obvious that footprinting is essential to any successful attack. By and large, 70% of any attack should be spent gathering precise footprinting. In doing so, an attacker presumably knows operating system, open…
-
Big Brother is watching WhatsApp
Is China the Big Brother that watch over its citizens from the harmful contents of social network? The question arose once again after the country decided to block WhatsApp mobile messaging application on its border. To be fair, WhatsApp was…
-
Fundamentals of Ethical Hacking
Footprinting is understood as information gathering and very first step in any cyber-attack on information systems. It is somewhat crucial for the attackers streamline a scope of his work and help him select the tools being used. There is a…
-
Big Four, Deloitte hacked and who’s next?
In a giant-slaying act, the world’s leading accounting firm, Deloitte got hacked and sent shockwave to the rest of the “Big Four†global accounting firms on who’s next on the hit list. The attack on accounting giant occurred on Monday,…
-
Ransomware is the biggest story in Computer Hacking today
Unfortunately, it doesn’t seem like there is an end in sight. As matter of fact, the hacks seem to be getting more and more sophisticated as the days go by. As long as the reasons for the hacking continues to…
-
Rearming for Cyber-warfare
War costs moneys and it is no brainers that the wealthy state with a bigger economy can always awash weapons of mass destruction at a moment notice to turn the tide of war. In cybersecurity or rather cyber-warfare, funds are…
-
Pen Testing Tools The Pros Use
Pen Testing Tools The Pros Use. What is pen testing? Penetration testing is a test performed by professional hackers to determine if a system is vulnerable to attack – before the attackers do. In other words if the tested systems…
-
How To Turn On Internal Mobile Hotspot for Windows 10?
One of them being the ability to create a Wi-Fi hotspot. The great benefit here is that you can do that if you have the OS installed and a bit of knowledge about how to complete the process. It really…
-
How can you permanently delete files without sending them to the recycle bin?
If you are a Windows user, chances are that you always have to deal with lots of files that you want to delete from your computer. T he downside is that you always have to go to the recycle bin…
Join 900+ subscribers
Stay in the loop with everything you need to know.