Welcome to our first release of 2018, Kali Linux 2018.1. This fine release contains all updated packages and bug fixes since our 2017.3 release last November. This release wasn’t without its challenges–from the Meltdown and Spectre exciteme…
City and Countryside Security: What’s the Difference?
Many people think that crime, including burglary, is more prevalent in cities than it is in small countryside towns and villages. This may be the case for very densely populated cities such as London and Birmingham, however the majority of countryside locations are not crime-free. Anybody who has watched Emmerdale or Midsomer Murders knows that […]
The post City and Countryside Security: What’s the Difference? appeared first on Assured Security Solutions.
The Best Hacking Books 2018
One of the most popular and most asked questions since I’ve started this blog is if I can recommend some good hacking books to read for beginners and more experienced hackers and penetration testers. In this article I want to highlight some hacki…
ANGALIZO KWA MABENKI DHIDI YA UHALIFU WA ATM JACKPOTING
KWA UFUPI: ATM
jackpotting imgonga Hodi Nchini Marekani ambapo imesababisha upotevu mkubwa wa
fedha zinazo kadiriwa kuzidi kiasi cha Dola milioni moja hadi sasa.
———-
Kumekua
na aina nyingi za uhalifu mtandao unaolenga mashine za ATM ambao…
New World, New Rules: Securing the Future State
I published an article today on the Oracle Cloud Security blog that takes a look at how approaches to information security must adapt to address the needs of the future state (of IT). For some organizations, it’s really the current state. But, I like t…
Your Journey Starts Here
“Whether you’re new to the fight, or a seasoned pro, don’t stop training…”
This statement, like the video that introduced it, has real punch. We did this on purpose to get you fired up, excited about your training,…
“LEBANON IS BEHIND DATA-STEALING SPYWARE“ – EFF UNCOVERED
A
security bug that has infected thousands of smartphones has been uncovered by
campaign group the Electronic Frontier Foundation (EFF).
Working
with mobile security firm Lookout, researchers discovered that malware in fake
messaging designed to…
From Shodan to Remote Code Execution #3: Hacking the Belkin N600DB Wireless Router
Our newest post of this interesting series of Shodan to RCE takes us to Belkin routers. Shodan search: “Server: httpd” “Cache-Control: no-cache,no-store,must-revalidate, post-check=0,pre-check=0” “100-index.htm” As a…
Security Beyond The Perimeter
Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls that rely solely on broad […]
Kali on the Windows Subsystem for Linux
Update : This post is outdated. For a better way of getting Kali Linux on Windows 10, install Kali Linux from the App store.
We’re always on the prowl for novel environments to run Kali on, and with the introduction of the Windows Subsystem for L…