information technology
244 views | +0 today
Follow
Your new post is loading...
Your new post is loading...
Scooped by Vaibhav Ingle
Scoop.it!

INURLBR - Advanced Search Engine Tool - Darknet - The Darkside

INURLBR - Advanced Search Engine Tool - Darknet - The Darkside | information technology | Scoop.it
INURLBR is a PHP based advanced search engine tool for security professionals, it supports 24 search engines and 6 deep web or special options.
more...
No comment yet.
Rescooped by Vaibhav Ingle from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Troy Hunt: How your data is collected and commoditised via “free” online services

Troy Hunt: How your data is collected and commoditised via “free” online services | information technology | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean

NASA HACKED! AnonSec tried to Crash $222 Million Drone into Pacific Ocean | information technology | Scoop.it
AnonSec hacked into NASA systems and tried to Crash a $222 Million Drone into the Pacific Ocean
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

What is blockchain and what does it have to do with the Internet of Things? | The Big Data Hub

What is blockchain and what does it have to do with the Internet of Things? | The Big Data Hub | information technology | Scoop.it

What is blockchain? Blockchain is garnering more and more attention as a way to make sure the IoT is ready for its ongoing evolution.

more...
No comment yet.
Rescooped by Vaibhav Ingle from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Exploit ADSL router using NMAP

Exploit ADSL router using NMAP | information technology | Scoop.it
Exploit ADSL router using NMAP

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Vaibhav Ingle from Information Security
Scoop.it!

Beginner’s Guide to Open Source Intrusion Detection Tools

Beginner’s Guide to Open Source Intrusion Detection Tools | information technology | Scoop.it
If you aren’t already running network IDS, you should be. Whether you need to monitor hosts or the networks connecting them to identify the latest threats, there are some great open source intrusion detection (IDS) tools available to you. This guide provides an overview of some of the most popular Open Source IDS tools, along with pros/cons of each.

There are two types of network IDS: Signature Detection & Anomaly Detection. In a signature-based IDS, there are rules or patterns of

Via Paul Misner
more...
Paul Misner's curator insight, October 8, 2015 10:20 AM

This is a very good overview of some of the best tools for IDS, both host based and network based. Alienvault is itself based on an open source tool. You have to register to get it, but it was worth it to me.

Scavanna's curator insight, October 9, 2015 9:31 PM
#SecurityOpenTools #infosec
Rescooped by Vaibhav Ingle from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

A-Z Kali Linux Commands •

A-Z Kali Linux Commands • | information technology | Scoop.it
A-Z Kali Linux Commands • HaCoder

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Vaibhav Ingle from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network.pdf


Via Constantin Ionel Milos / Milos Constantin
Vaibhav Ingle's insight:

Must read for any tor user!

more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

4 brilliant new Google projects that will shape the future of computing

4 brilliant new Google projects that will shape the future of computing | information technology | Scoop.it
Google focused on a few main projects at Google I/O last week that'll soon lead to some big launches, including Android M, Google Now and Jump virtual reality. But these are hardly the only things ...
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

The best way to protect your passwords may be creating fake ones

The best way to protect your passwords may be creating fake ones | information technology | Scoop.it
A research project, NoCrack, creates plausible decoy password vaults to confuse attackers
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

8 Instances You Weren’t Using a VPN, but Should’ve Been: The VPN Checklist

8 Instances You Weren’t Using a VPN, but Should’ve Been: The VPN Checklist | information technology | Scoop.it
A Virtual Private Network will help you protect your right to privacy in numerous areas of your digital life. Global news is dominated by instances of hacking, mass data collection, data snooping and more, and as our lives are now digitally intertwined with our computers, laptops, smartphones and tablets, it might be the right time…
more...
No comment yet.
Rescooped by Vaibhav Ingle from Information Security
Scoop.it!

How one hacker exposed thousands of insecure desktops that anyone can remotely view | ZDNet

How one hacker exposed thousands of insecure desktops that anyone can remotely view | ZDNet | information technology | Scoop.it
Badly configured software used on thousands of machines can let hackers into X-ray scanners, industrial control systems, doctors' servers storing medical records, and more.

Via Paul Misner
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

PEiD - Detect PE Packers, Cryptors & Compilers - Darknet - The Darkside

PEiD - Detect PE Packers, Cryptors & Compilers - Darknet - The Darkside | information technology | Scoop.it
PEiD is an intuitive application that relies on its user-friendly interface to detect PE packers, cryptors and compilers found in executable files.
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

Default Apache Configuration Can Unmask Tor Hidden Services

Default Apache Configuration Can Unmask Tor Hidden Services | information technology | Scoop.it
Default Apache Configuration with mod_status module Can Unmask Tor Hidden Services
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

Facebook adds Built-in Tor Support for its Android App

Facebook adds Built-in Tor Support for its Android App | information technology | Scoop.it
Facebook Android App adds Built-in Tor Support via Orbot anonymizing software
more...
No comment yet.
Rescooped by Vaibhav Ingle from opexxx
Scoop.it!

Kali Linux: Kill Chain

Kali Linux: Kill Chain | information technology | Scoop.it
Kill Chain for Kali Linux 2.0 is a unified console with an anonymizer that will perform these stages of attacks: Reconnaissance Weaponization Delivery Expl

Via alexander knorr
more...
No comment yet.
Rescooped by Vaibhav Ingle from Information Security
Scoop.it!

Ghost Push Malware Hits Google Play, Affects 900,000 Android Devices: Report

Ghost Push Malware Hits Google Play, Affects 900,000 Android Devices: Report | information technology | Scoop.it
The malware roots the victim's Android device to get admin access, which it uses to download and install more malicious apps.

Via Paul Misner
more...
No comment yet.
Rescooped by Vaibhav Ingle from Information Security
Scoop.it!

New Moker RAT Bypasses Detection

New Moker RAT Bypasses Detection | information technology | Scoop.it
Moker, a new remote access Trojan targeting Windows machines, can effectively mitigate security measures and grant an attacker full access to the system.

Via Paul Misner
more...
Paul Misner's curator insight, October 7, 2015 2:02 PM

From what I see pretty much only hardware isolation on a non-windows browser could prevent this attack. www.spikes.com

Rescooped by Vaibhav Ingle from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Kemoge: Latest Android Malware that Can Root Your Smartphone

Kemoge: Latest Android Malware that Can Root Your Smartphone | information technology | Scoop.it
Latest Kemoge Adware Malware that Can Root Android Smartphone

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Vaibhav Ingle from Advanced Threats,Intelligence Technology,CyberSecurity
Scoop.it!

Analyzing Malicious Documents Cheat Sheet: Microsoft Office (DOC, XLS, PPT) and Adobe Acrobat (PDF) files .

Analyzing Malicious Documents Cheat Sheet:   Microsoft Office (DOC, XLS, PPT) and Adobe Acrobat (PDF) files . | information technology | Scoop.it

Via Constantin Ionel Milos / Milos Constantin
more...
No comment yet.
Rescooped by Vaibhav Ingle from Information Security
Scoop.it!

OPM data offered for sale on the Dark Web

OPM data offered for sale on the Dark Web | information technology | Scoop.it
While security experts speculate on the possible responsible for the recent data breach at US the Office of Personnel Management (OPM) the alleged data appeared in the dark web. I have personally found it on a popular black market available for sale. The OPM DB sample is offered by a user that use the pseudonymous of PING.

Via Paul Misner
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

This 3D Printed Robot Cracks Combination Locks in Less than 30 Seconds

This 3D Printed Robot Cracks Combination Locks in Less than 30 Seconds | information technology | Scoop.it
A 3D-printed Combo Breaker Robot Cracks Combination Locks in Less than 30 Seconds.
more...
No comment yet.
Scooped by Vaibhav Ingle
Scoop.it!

Password Alert Warns You When Your Google Password Is Phished

Chrome: Google launched a new extension today called Password Alert that’s designed to keep you from using your Google password on sites that aren’t operated by Google.
more...
No comment yet.