Bobby Joe

80 Flips | 3 Magazines | 5 Likes | 1 Following | 2 Followers | @rapell | Master of Unagi

How to lock up your digital life in less than an hour

Follow this simple checklist of best practices to protect your privacy and information without spending a cent.<p><b>VIDEO</b><p>Taking individual responsibility …

Nikon's new beginner DSLR instantly beams all your photos to your phone

The D5600 is part of a new guard from Nikon, and it’s coming to America<p>Nikon announced the D5600 DSLR in November, but the Japanese company waited until just now at CES 2017 to let us know when the camera is coming stateside. Good news! It’s soon. As in, the camera will be available starting this …

8 Books Security Pros Should Read

Hunting for a good resource on the security industry? Check out these classics from the experts to learn more about hacking, defense, cryptography …

2020techblog.com

Anatomy of a cryptographic collision – the “Sweet32” attack

Researchers at the Institute for Research in Computer Science and Automation in France (INRIA) have come up with the latest BWAIN.<p>A BWAIN is a Bug …

F-Secure's Mikko Hypponen Details 5 Top Cybercrime Trends

From Nation States to Ransomware Gangs, Online Crime Pays Mathew J. Schwartz (euroinfosec) • June 8, 2016<p>Online crime continues to be one of the most …

Watch: John Oliver perfectly and hilariously explains the FBI’s war with Apple

If there’s one tech topic you’ve seen repeatedly discussed over the past weeks, that’s the FBI’s war against Apple’s strong iPhone encryption. The …

Privacy

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 13 (Web Delivery for Windows)

Welcome back, my hacker novitiates!<p>In the previous part of this series, we looked at how to use Metasploit's web delivery exploit to create a script …

2015's Largest Banking Hacks

2015 represented a year where banks all over the world fell victim to the activities of hackers.<p>2015 represented a year where banks all over the world fell victim to the activities of hackers. It led to details leaked everywhere and even cash machines randomly dispensing money. 2015 was the year …

How to repair Ubuntu if it won't boot

Start-up problems. That moment when – having expected yourself to be getting on with your day's work or entertainment – you find yourself staring at …

Get Started With a VPN: For Beginners, Power Users, and IT Pros

Do you want to be secure--I mean really secure--when you're on the Internet? If so, then you want a virtual private network.<p>A VPN creates a secure "tunnel" across the Internet between you and your office, a VPN provider, or your home. Why would you want that? Easy-to-use programs such as Firesheep …

There's a problem with computer security. You

Author:<p>Published<p>in Security threats, Video 10<p>Today law enforcement agencies warned the public about the Dridex malware that has been targeting …

BaBE - Bash By Examples

BaBE - Bash By Examples; Your significant Linux scripting tutorial;;<p>MindMap<p>Hello world<p>The easiest way to get your feet wet with a programming …

Blackphone 2 from Silent Circle will test whether security is a priority for smartphone buyers

People never hesitate to say that security and privacy are very, very important to them. But too often, their actions say otherwise.<p>Whether it’s never changing passwords, or not making them strong enough in the first place, people often fail to take the simplest of steps to enhance their privacy …

We Need a Code of Ethics to Govern Digital Forensics

Let me begin with a disclaimer: I am neither a digital forensics practitioner nor do I play one on television.<p>I am, however, a professor in, and …

Kali Linux 2.0 released: New 4.0 kernel, improved hardware and wireless driver coverage - Help Net Security

Kali Linux, the open source penetration testing platform, has reached version 2.0.<p>Kali Linux 2.0 comes with a 4.0 kernel, now based on Debian Jessie. …

Linux

Here's the event that triggered World War I

On July 28th, 1914, a month after 19-year-old Gavrilo Princip killed Ferdinand, Austria-Hungary declared war on Serbia and invaded, igniting a conflict that would last five years and kill an estimated 17 million people.<p>Historians still debate whether the European powers would have fought a …

War

11 apps that will make you smarter

Despite the constant hand-wringing that smartphones will lead to the downfall of society, there’s mounting evidence that your phone habit may not be so bad after all.<p>In fact, there are ways your phone might actually be good for you.<p>We’ve compiled a list of apps to boost your brainpower, hone your …

Anonymous Hacker breached WTO database

Hackers belonging to the Anonymous collective hacked the website of the World Trade Organization (WTO) and leaked personal data of thousands of …

Second HTTPS snooping flaw breaks security for thousands of iOS apps

Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking …

Encrypting Your Laptop Like You Mean It

TIME AND AGAIN, people are told there is one obvious way to mitigate privacy threats of all sorts, from mass government surveillance to pervasive …

Ethical Hacker & Penetration Tester Course for $24.99, Save 74%

The Ethical Hacker & Penetration Tester Course normally retails for $99, although we have the course available in the Geeky Gadgets Deals store for …

Quantum Insert Attack, Author: Basil Alawi S.Taher

The Dutch company Fox-IT has revealed a detailed information about Quantum Insert Attack. "‘HTML Redirection’ attack by injecting malicious content …

Send notes, directions, more to Android phones from a Google search

Last week, we showed you how to find your Android phone with a simple Google search. Now Google is introducing new features that allow you to push …

Android News

Top Android news of the week: Samsung incognito, rooting kills, Nokia phones

In Android this week we had reports of the return of the Nokia phone, Samsung is sneaking into Japan, and a serious bug in Android Wi-Fi was …

Update Samsung Galaxy S4 with CyanogenMod [Official] Android 5.1 Lollipop CM12.1 Custom ROM [How to Install] - IBTimes India

CyanogenMod [Official] CM12.1 custom ROM is a nightly version and is based on the latest AOSP (Android Open Source Project) 5.1 Lollipop. It brings a …

Are you paranoid, patient, and rich? This super-secure smartphone is for you

Turing Robotic Industries, a company you’ve probably never heard of, has announced a smartphone. To make it stand out, the device is not only super …

Alan Turing

Mobile Photography Tutorial – Snapseed 2.0 in Depth: Part 1 – TheAppWhisperer

The post Mobile Photography Tutorial – Snapseed 2.0 in Depth: Part 1 – TheAppWhisperer appeared first on TheAppWhisperer.We are delighted to publish …

What enterprises need to know about the Regin malware toolkit

Follow:<p>New malware, threats, vulnerabilities and attacks will always gather the most attention, and this attention always...<p>focuses on how these …