Kazım Sarıkaya

107 Flips | 2 Magazines | 1 Like | @srkykzm | Keep up with Kazım Sarıkaya on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Kazım Sarıkaya”

Nmap from Beginner to Advanced

Network Mapped (Nmap) is a network scanning and host detection tool that is very useful during several steps of penetration testing. Nmap is not …

Nmap Cheat Sheet: From Discovery to Exploits - Part 1: Introduction to Nmap

As always during reconnaissance, scanning is the initial stage for information gathering.<p><b>What is Reconnaissance?</b><p>Reconnaissance is to collect as much …

WhatsApp and iMessage could be banned under new surveillance plans

David Cameron could block WhatsApp and Snapchat if he wins the next election, as part of his plans for new surveillance powers announced in the wake …

KeySweeper

<b>KEYSWEEPER // SIGINT // SAMY.PL // REL TO ALL // APPLIED HACKING</b><p><b>KeySweeper</b> is a stealthy Arduino-based device, camouflaged as a functioning USB wall …

IT mentorships should be a learning experience for mentor and mentee

up<p>172 readers like this<p>By<p>Cliff Tamplin<p>on<p>January 09, 2015<p>When it comes to mentoring, I don’t think it should be a one-way process. As a mentor, I …

​CES 2015: Linksys 1200AC, an inexpensive, open-source 802.11ac Wi-Fi router

Want 802.11ac Wi-Fi speeds at an affordable price and with open-source software under the hood? If that's you, then you're going to want to check out …

Hacking Facebook with a forged Microsoft Word document

A security expert discovered a vulnerability in Facebook that allows to perform several malicious activities just uploading a forged Microsoft Word …

New Documents on NSA's Cryptanalysis Capabilities

<i>Der Spiegel</i> published a long article today on the NSA's analysis capabilities against encrypted systems, with <i>a lot</i> of new documents from the Snowden …

Virlock, the first self-reproducing polymorphic Ransomware

Sophos and ESET detected the first self-reproducing polymorphic Ransomware dubbed Virlock that encrypts files and creates unique instances of …

Yet more Android vulnerabilities discovered – 10m users potentially affected

Following news earlier this month that budget Android phones had been pre-installed with malware, another story about Android vulnerabilities emerges.<p>…

North Korea DDoSed Off the Internet

North Korea has been knocked off the Internet by a distributed denial-of-service (DDoS) attack. Maybe the US did it, and maybe not.<p>This whole …

RT @bgpmon: DDOS attack brings down Internet in North Korea starting at 16:14 UTC! After hours of instability, N Korea offline. http://t.co/qmz0kEAUZy

Cyber attacks now longer than ever - Help Net Security

Cyber attacks have reached a tipping point in terms of quantity, length, complexity and targets. As cyber threats are growing and expanding to new …

Analysis of the CVE-2013-6435 Flaw in RPM

The RPM Package Manager (RPM) is a powerful command-line driven package management system capable of installing, uninstalling, verifying, querying, …

Decryption Tool Available for Crypto-Malware Operation Global III

<b>A patching utility against crypto-malware Operation Global III (OG3) has been created, to prevent users from paying the ransom and free their files</b> …

ZANO Drone Wants To Take Your Selfie From The Sky

Crowdfund your own personal aerial paparazzi<p>A Kickstarter project wants to take the art of the selfie to a higher level -- literally. ZANO, by the Wales-based Torquing Group Ltd, is a palm-sized drone that will fly out from users at up to 25 mph, take stabilized 720p video at 60 fps, and send it …

Open source history, present day, and licensing

<b>This article is part of my talk, Open-Source Business Models. You can see the full transcript and the video of my talk on Heavybit.com.</b><p>My name is …

RT @sehnaoui: I really hope that the @blackhatmovie coming out will be better than their promotional statistics. #BlackHat http://t.co/bLTaPkuoHs

Image Lock - Fun, Easy to Remember Combination Lock

<b>IMAGE-LOCK</b> is a fun reinvention of the classic combination lock that replaces numbers with pictures on its dial. Now, instead of opening a lock with …

The Global Internet Is Being Attacked by Sharks, Google Confirms

The Internet is a series of tubes ... that are sometimes attacked by sharks.<p>Will Oremus is <b>Slate</b>’s senior technology writer. Email him at …

Why contractors' home networks are a security threat

Companies should take note of a recent poll that found contractors and IT administrators were the favorite targets of hackers.<p>Four in 10 of a 127 …

This Algorithm Changes the Time of Day, Season and Weather in Your Photos

Researchers at Brown University have created an intriguing little algorithm that allows you to alter the weather, time of day and even season in your …

Does having open source experience on your resume really matter?

"Code is the next resume." These words by Jim Zemlin, executive director at The Linux Foundation tell profoundly about how our technology industry, …

USB’s security is fundamentally broken, researchers claim

German security researchers claim to have identified a serious vulnerability in the fundamental security of USB devices. The SR Labs team is …

The ultimate geek privacy. You must wear these glasses, to read *anything* on the screen

Author:<p>Published<p>in Privacy, Video 0<p>Are you worried about someone looking over your shoulder, reading what is on your screen?<p>I may have found you the …

Serious security issues affect 14 of 17 major antivirus engines

Joxean Koret, a security researcher at Singapore-based consultancy COSEINC, has publicly revealed a series of flaws which affect major antivirus …

Why you'll keep getting hacked

Don't like getting hacked? Sorry, you'd better get used to it.<p>Every few weeks, we learn about another data breach. It's the privacy world's version of an oil spill. A hacker breaks into a company and grabs a database of our personal details. They're sold on the black market, and the exposure puts …

Pafish (Paranoid Fish)

<b>Introduction</b><p>In this tutorial we’ll take a look at a Pafish tool, which performs anti debugger/vm/sandbox tricks to detect whether the malware is …