I write about ethical hacking, cybersecurity and digital privacy.
-
In this series, we look at some great techy gear and gadgets so you can put your skills to the test and have some fun along the way. We tailor pick gadgets and gear that we think adds a new…
-
Top Hacking Simulator Games Every Aspiring Hacker Should Play: Part 1
Every aspiring hacker should delve into the world of hacking simulation games, these games aren’t just a way to kill time and avoid study, but often an excellent way to sharpen your hacking skills. There are a wide variety of…
-
The APT attacks hitting East Asia
East Asia have been targeted by a stream of cyber-attacks carried about by an advanced persistant threat (APT) group. The group goes by several names such as Tick, Brzone Butler and Redbaldknight. The APT group’s main targets are South Korea…
-
Libssh Security Flaw leaves thousands of servers vulnerable to hijacking
A security flaw in libssh leaves thousands, and potentially more, servers vulnerable to an attack. Libssh is a multiplatform C library which allows users to remotely execute programs, transfer files, manage public keys and use a secure and transparent tunnel.…
-
Ad Clicker Disguised as a Google Photos App has been Hosted on Microsoft Store.
A malicious app called “Album by Google Photos†was found to be hosted on the Microsoft store. The app was pretending to be part of Google Photos, but was in fact an ad clicker that generates hidden adverts within the…
-
Great Techy Gear and Gadgets: Series 2
In this series we’ll look at some great techy gear and gadgets so you can put your skills to the test and have some fun along the way. We tailor pick gadgets and gear that we think add a new…
-
Here’s why you absolutely need an endoscopic camera in your toolbox
Clogged drains, engine troubles, keyboard malfunctions… most of the technical issues we struggle with on a day-to-day basis could all be fixed if it were easier to see what was wrong and diagnose the actual problem. That’s why everyone should…
-
How to guide: Check if your Facebook Account has been hacked?
At the end of September, it was revealed that a Facebook security flaw allowed the access tokens of over 50 Million accounts to be stolen . Access tokens allow users to stay signed in on devices, rather than signing in…
-
Several vulnerabilities found in RouterOS that Affected MikroTik Routers
Tenable researcher, Jacob Baines, has discovered multiple vulnerabilities in the Mikrotik routers; four separate security flaws that are vulnerable to hacking attacks. Mikrotik made it into the news in September after it was discovered routers had been hijacked using a…
-
Great Techy Gear and Gadgets: Series 1
In this series we’ll look at some great techy gear and gadgets so you can put your skills to the test and have some fun along the way. The Complete Arduino Starter Kit & Course Bundle ($89.99) The Complete Arduino…
Join 900+ subscribers
Stay in the loop with everything you need to know.