One of the most popular and most asked questions since I’ve started this blog is if I can recommend some good hacking books to read for beginners and more experienced hackers and penetration testers. In this article I want to highlight some hacki…
ANGALIZO KWA MABENKI DHIDI YA UHALIFU WA ATM JACKPOTING
KWA UFUPI: ATM
jackpotting imgonga Hodi Nchini Marekani ambapo imesababisha upotevu mkubwa wa
fedha zinazo kadiriwa kuzidi kiasi cha Dola milioni moja hadi sasa.
———-
Kumekua
na aina nyingi za uhalifu mtandao unaolenga mashine za ATM ambao…
New World, New Rules: Securing the Future State
I published an article today on the Oracle Cloud Security blog that takes a look at how approaches to information security must adapt to address the needs of the future state (of IT). For some organizations, it’s really the current state. But, I like t…
Your Journey Starts Here
“Whether you’re new to the fight, or a seasoned pro, don’t stop training…”
This statement, like the video that introduced it, has real punch. We did this on purpose to get you fired up, excited about your training,…
“LEBANON IS BEHIND DATA-STEALING SPYWARE“ – EFF UNCOVERED
A
security bug that has infected thousands of smartphones has been uncovered by
campaign group the Electronic Frontier Foundation (EFF).
Working
with mobile security firm Lookout, researchers discovered that malware in fake
messaging designed to…
From Shodan to Remote Code Execution #3: Hacking the Belkin N600DB Wireless Router
Our newest post of this interesting series of Shodan to RCE takes us to Belkin routers. Shodan search: “Server: httpd” “Cache-Control: no-cache,no-store,must-revalidate, post-check=0,pre-check=0” “100-index.htm” As a…
Security Beyond The Perimeter
Whether we like it or not, the way we architect, utilize, and secure the networks and systems under our control has changed. When servers were safely tucked away behind corporate firewalls and perimeter-deployed intrusion prevention controls, organizations became complacent and dependent on their host security. Unfortunately, inadequately architected security controls that rely solely on broad […]
Kali on the Windows Subsystem for Linux
Update : This post is outdated. For a better way of getting Kali Linux on Windows 10, install Kali Linux from the App store.
We’re always on the prowl for novel environments to run Kali on, and with the introduction of the Windows Subsystem for L…
Update your WiKID servers for Spectre and Meltdown
Since basically every computer is affected by these bugs, your WiKID server is too. You will need to run ‘yum update’ to get the latest kernel patches. (And it’s a great idea to do this regularly.) Reboot and you should have the fix.
You can run:
rp…
APPLE YAKIRI KUATHIRIWA NA “MELTDOWN” PAMOJA NA “SPECTRE”
Ugunduzi
wa mapungufu makubwa mawili yaliyopewa jina la “Meltdown na Spectre” yaliyoathiri
Kifaa cha Kopyuta kinachojulikana kwa jina la“Chip” ambapo athari zake ni kupelekea wizi wa
taarifa kwa watumiaji mtandao umeendelea kuchukua sura mpya…