HACKING
Follow
Find
634 views | +0 today
HACKING
hacking,network security,vulnerability,metasploit
Curated by medicalist
Your new post is loading...
Your new post is loading...
Rescooped by medicalist from Smartphone Security
Scoop.it!

New Phishing Vulnerability Discovered In All Versions Of Android [Updates]

New Phishing Vulnerability Discovered In All Versions Of Android [Updates] | HACKING | Scoop.it
A new phishing technique utilizing SMS messages has just been in discovered in the Android Open Source Project.

Via security informer
more...
No comment yet.
Rescooped by medicalist from Top Vpn | Top Vpn Provders
Scoop.it!

Safe You From Hackers With vpncreative.com

Safe You From Hackers With vpncreative.com | HACKING | Scoop.it

This is how VPN services helps in in sending secure data and safes information from hackers. Interested to know more? visit to http://vpncreative.com/


Via Walter Louis
more...
No comment yet.
Rescooped by medicalist from Security & Hacktivism
Scoop.it!

Many ways to break SSL with CRIME attacks, experts warn

Many ways to break SSL with CRIME attacks, experts warn | HACKING | Scoop.it
Despite browser fixes, disabling SSL compression on servers may be best defense.

Via Joaquín Herrero Pintado
more...
No comment yet.
Rescooped by medicalist from Network security
Scoop.it!

Metasploit Autopwn With Nessus Tutorial | Ethical Hacking-Your ...

Metasploit Autopwn With Nessus Tutorial | Ethical Hacking-Your ... | HACKING | Scoop.it

really easy


Via shabgard
more...
No comment yet.
Rescooped by medicalist from technotux
Scoop.it!

Wireless network can watch your breathing

Wireless network can watch your breathing | HACKING | Scoop.it
The chest's rising with each inhalation bends the radio waves, reducing their power...

Via shabgard
more...
No comment yet.
Rescooped by medicalist from Pentesting
Scoop.it!

Black Hat USA 2010 Conference Videos » CrDD

Black Hat USA 2010 Conference Videos » CrDD | HACKING | Scoop.it
Im Secure Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing Industrial Bug Mining Extracting, Grading and Enriching the Ore of Exploits Virtual Forensics Network Stream Debugging with Mallory JavaSnoop: How to ...

Via shabgard
more...
No comment yet.
Rescooped by medicalist from Network security
Scoop.it!

How To compile Exploits | Learn Free Hacking And Ethical Hacking |learn Cyber Security and Blogging

How To compile Exploits | Learn Free Hacking And Ethical Hacking |learn Cyber Security and Blogging | HACKING | Scoop.it
Learn Ethical Hacking And Get Hacking Ebooks , Download Free Hacking Tools and Softwares learn Unix And Linux Hacking | Penetration Testing | Cyber Crimes Investigations and Consulting |Learn Cyber Security...

Via shabgard
more...
No comment yet.
Rescooped by medicalist from Network security
Scoop.it!

Android app turns smartphones into hacking machines | Secfence Blog

Android app turns smartphones into hacking machines | Secfence Blog | HACKING | Scoop.it
A good news for all android dominated security nerds out there! At DefCon, Itzhak Zuk Avraham, also known by the handle @ihackbanme showed off the new hacking tool. The tool is called “The Android Network Toolkit,” named Anti for short.

Via shabgard
more...
No comment yet.
Rescooped by medicalist from Security & Hacktivism
Scoop.it!

Many ways to break SSL with CRIME attacks, experts warn

Many ways to break SSL with CRIME attacks, experts warn | HACKING | Scoop.it
Despite browser fixes, disabling SSL compression on servers may be best defense.

Via Joaquín Herrero Pintado
more...
No comment yet.
Rescooped by medicalist from Top Vpn | Top Vpn Provders
Scoop.it!

VPN SendsYour Data Through Secure Tunnel

VPN SendsYour Data Through Secure Tunnel | HACKING | Scoop.it

Send your data throught secure VPN tunnel and safe your data from from hackers? Want to know more than visit to http://vpncreative.com/


Via Walter Louis
more...
No comment yet.
Rescooped by medicalist from Security & Hacktivism
Scoop.it!

Sam Granger | WhatsApp is using IMEI numbers as passwords

enteresan


Via Joaquín Herrero Pintado
more...
No comment yet.
Rescooped by medicalist from Security & Hacktivism
Scoop.it!

Android incoming SMS with no permissions

Android incoming SMS with no permissions | HACKING | Scoop.it

android-sms-spoof - PoC app which takes advantage of Android's SmsReceiverService being exported to fake an incoming SMS with no permissions.


Via Joaquín Herrero Pintado
more...
No comment yet.
Rescooped by medicalist from technotux
Scoop.it!

By Encoding Messages in Glowing Proteins, Scientists Turn E. Coli Into Invisible Ink

By Encoding Messages in Glowing Proteins, Scientists Turn E. Coli Into Invisible Ink | HACKING | Scoop.it

"the technique involves encoding messages in the colors of glowing bacteria, which can be later unlocked with antibiotics."


Via shabgard
more...
No comment yet.
Rescooped by medicalist from Pentesting
Scoop.it!

Hacking your Droid

In this paper, I would be focussing on the Android OS, and discussing about its security, and existing ... Android is supported by a Linux Kernel 2.6.x at its core. ... Some more examples of services are network operations, file input/output etc.

Via shabgard
more...
No comment yet.
Rescooped by medicalist from Pentesting
Scoop.it!

Multi Threaded TCP Port Scanner For Linux & Windows | Darknet ...

Multi Threaded TCP Port Scanner For Linux & Windows | Darknet ... | HACKING | Scoop.it
Ethical Hacking, Penetration Testing & Computer Security ... Please be aware that SYN scan requires a higher level of authorization, if compared to connect sockets: in Unix/Linux pscan requires root privilege.

Via shabgard
more...
No comment yet.
Rescooped by medicalist from Network security
Scoop.it!

Metasploit Autopwn With Nessus Tutorial | Ethical Hacking-Your ...

Metasploit Autopwn With Nessus Tutorial | Ethical Hacking-Your ... | HACKING | Scoop.it

really easy


Via shabgard
more...
No comment yet.
Rescooped by medicalist from Security & Hacktivism
Scoop.it!

WhatsApp is using IMEI numbers as passwords.

WhatsApp is using IMEI numbers as passwords.


Via Joaquín Herrero Pintado
more...
No comment yet.
Rescooped by medicalist from Information Security Education
Scoop.it!

Stealing Documents Through Social Media Image-Sharing - Dark Reading

Stealing Documents Through Social Media Image-Sharing - Dark Reading | HACKING | Scoop.it
Innocent-looking vacation pictures on Facebook could conceivably traffic exfiltrated documents, Black Hat researchers warn...

Via Justyna LaPay
more...
No comment yet.