The most recent content from our members.
If you’ve developed a desire to learn more about hacking or to try a little hacking yourself, there are a lot of resources at your disposal to get started. Keep in mind, our premise here is how to hack without breaking any laws, which is important to remember. That being said, there’s nothing illegal about talking about…
Who is Ubisoft? Ubisoft Entertainment is a French global video game publisher and developer, and is one of the largest independent game publishers in Europe and the United States. Do you remember playing Assassin’s Creed and Price of Persia? Those were from Ubisoft. Hacking? What Happened? One of Ubisoft’s websites was…
In most office environments, power strips or surge protectors are a normal, everyday device that most of our computers, printers, copiers, etc. are plugged into. They’re fairly innocuous and probably something we take for granted, right? Just a normal piece of equipment in our office. What if that power strip was actually…
You’ve read up on the history of hacking, its motivations, and benefits for you as an IT professional. You’ve watched videos and read technical books on hacking tools and even spent a few hard-earned dollars on some nifty hacking gadgets to learn from on your own personal hack-lab playground. Now what? What can you do with…
For most people these days, the word “hacking” conjures images of nefarious intruders attempting to gain illegal access to financial institutions, corporations, and private citizens’ computers for theft and profit. Exploitation of unsecured computer systems, cloud services, and networks make headlines daily, with large…
GRIZZLY STEPPE is what the Joint Task force (NCCIC & FBI) code-named two specific Russian cyber security attacks on the US in their joint analysis report. To realize in both instances that it was a single user reaction to a spear fishing attack that enabled the hacking, really makes me wonder about how to truly harden an…
In what is one of the most calamitous cyber-crime attacks that organizations storing personally identifiable information and card-holder data have faced, Target Corporation, one of America’s leading and reputed retailing company and chain of retail stores, has succumbed to a data breach that allowed hackers to compromise,…
In early October, Adobe was hacked and 3 million customer account details (IDs, passwords, and credit card information) were stolen. Seems whopping? There’s more. Last week, it was revealed that the real number is actually 38 million. Yes, usernames and encrypted passwords of 38 million active Adobe users were stolen as…
Hackers Steal 2 Million Usernames & Passwords from Social Networking Sites including Google, Facebook, Twitter and LinkedIn This is a whale of a heist. All the social network stalwarts have been outsmarted by hackers. Security experts at Trustwaves SpiderLabs have discovered a trove of 2 million hacked social network user…
Penetration testing or pen testing is a cool job. I’m telling you this before even we take a look at what it is and how it can be done. It’s a kind of white hat hacking practice. Another wacky jargon? Trust me that’s a cool job too. Now, really how many of us will want to get paid legitimately for hacking? This simply…
It looks like you're new here. Sign in or register to get started.