Boothole

BootHole Shows Need for Greater Scrutiny

The recent BootHole and related vulnerabilities raise the question of whether software used for critical security functions should have special scrutiny. When a security operation fails the ramifications are considerable, especially when ...
Security Boulevard
Securing Cookies with HttpOnly and secure Flags [Updated 2020]

Securing Cookies with HttpOnly and secure Flags [Updated 2020]

Learn how to fight malware Any program that runs can be disassembled, but that doesn’t mean it’s going to be easy. In this skills course you’ll learn ⇒ Anti-Debugging Techniques ⇒ Detecting ...
Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras

Twitter Hack Lessons Learned, TikTok Ban, Rite Aid Facial Recognition Cameras

In episode 133 for August 10th 2020: What we can learn from the big Twitter hack, why everyone is trying to ban TikTok, and pharmacy chain Rite Aid’s use of facial recognition ...
Lab: Hacking an Android Device with MSFvenom [Updated 2020]

Lab: Hacking an Android Device with MSFvenom [Updated 2020]

| | Hacking
Learn penetration testing Build your real-world pentesting skills through 34 hands-on labs. This skills course covers ⇒ Web app hacking ⇒ Hacking with Android ⇒ Ethical hacking Start your free trial... Go ...
Chinese "COVID-19" Hackers indicted after 11 year hacking spree

Chinese "COVID-19" Hackers indicted after 11 year hacking spree

On July 7, 2020, a Grand Jury in Seattle was presented with evidence about the eleven year campaign of Computer Network Intrusion being conducted by two former classmates who hacked for personal ...
Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack

Politician Amongst Those Who Had Their Direct Messages Accessed During Twitter Hack

More information has emerged related to last week’s attack which saw a number of high profile Twitter accounts hijacked for the purposes of spreading a cryptocurrency scam. Twitter has already said that ...

On the Twitter Hack

Twitter was hacked this week. Not a few people's Twitter accounts, but all of Twitter. Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system ...
Biggest Twitter Hack

Apple & Uber Hacked In Twitter Attack! 

On 15th July 2020, around 04:00 pm in the US, many high-profile Twitter accounts of personalities including Barack Obama, ElonContinue reading The post Apple & Uber Hacked In Twitter Attack! appeared first ...
connected cars

Connected Cars, Smart Homes Remain Targets 

The European Union Agency for Cybersecurity (ENISA) released a smart car safety report detailing how connected cars expand the potential of cyberattacks. Several years ago, IOActive researchers (among others) proved that it’s ...
Security Boulevard

SCADA & Security of Critical Infrastructures [Updated 2020]

Introduction Current Scenario Industrial control systems (ICS) and Supervisory Control And Data Acquisition (SCADA) systems are critical components for the operation of industrial facilities and... Go on to the site to read ...