Top 5 Vulnerable Sites To Practice Your Hacking Skills Legally
http://www.gadgetsay.com/2016/09/top-5-vulnerable-sites-to-practice-your-hacking-skills-legally/ Security people need places to practice. →
http://www.gadgetsay.com/2016/09/top-5-vulnerable-sites-to-practice-your-hacking-skills-legally/ Security people need places to practice. →
https://thelasttechie.com/2016/09/09/bug-free-code-thats-a-lie/ All code has bugs. →
http://arstechnica.com/security/2016/09/stealing-login-credentials-from-a-locked-pc-or-mac-just-got-easier/ Plug in $50 tiny Linux computer to Windows computer USB port and get login access credentials in 20 seconds. →
http://thehackernews.com/2016/09/hack-android-phone-security.html?m=1 Serious bug in Android just revealed. You might need to wait until your phone manufacturer/operator starts has update available. →
https://pentestmag.com/write-secure-code-cc-programming-languages/ This article list many things you should keep in mind when writing software with C and C++. →
http://news.softpedia.com/news/mirai-ddos-trojan-is-the-next-big-threat-for-iot-devices-and-linux-servers-507964.shtml This nasty trojan is targeted against Linux IoT devices. Mirai is an evolution of an older trojan, also used for DDoS attacks, known under many names, such as Gafgyt, Lizkebab, BASHLITE, Bash0day, Bashdoor, and Torlus. Mirai’s mode of operation is largely the same as Gafgyt, targeting IoT devices running Busybox. The trojan also targets →
http://www.tripwire.com/state-of-security/security-data-protection/cyber-security/how-a-massive-540-gbsec-ddos-attack-failed-to-spoil-the-rio-olympics/ Rio Olympics was under constant heavy DDoS attack from IoT botnet – and still they managed to keep everything working. →
https://www.entrepreneur.com/article/25330 →
http://www.cyberciti.biz/networking/nmap-command-examples-tutorials/ To celebrate nmap birthday, here are some tips how to scan your network using nmap. →
https://thelasttechie.com/2016/09/04/the-security-risks-of-third-party-data/ More and more secrets end up to Internet – it is not usually user’s fault and there is not much what you can do about that. →