White Hat

Weaponized AI -- Your Machine Is "Learning" But Who's The Teacher?

Weaponized AI — clickbait fiction or real threat? After reading several articles describing the methods hackers are using machine learning to infiltrate companies’ critical systems, I decided to reach out to a world-renown security expert to parse the facts from the hysteria.<p>Giovanni Vigna, …

Machine Learning

How To: Beginner's Guide to OWASP Juice Shop, Your Practice Hacking Grounds for the 10 Most Common Web App Vulnerabilities

Web application vulnerabilities are one of the most crucial points of consideration in any penetration test or security evaluation. While some …

Computer Hacking

Sextortionists Shift Scare Tactics to Include Legit Passwords

The scam emails offer, as proof of compromise, a password associated with the target’s online accounts.

Identity Theft

White Hat charter schools shrink again, turn e-school over to K12 Inc. founder

CLEVELAND, Ohio - The once-mighty White Hat charter school empire continues being dismantled, with its longtime e-school - the Ohio Distance Learning …

Education

How To: Use Command Injection to Pop a Reverse Shell on a Web Server

Command injection is a technique used by hackers to execute system commands on a server, usually via a web application or some kind of GUI. This can …

Cybersecurity

Pay What You Want Certified White Hat Hacker Bundle

We have a great pay what you want deal in the Geeky Gadgets Deals store today, the Pay What You Want Certified White Hat Hacker Bundle .<p>The best …

Ethical Hacking

GSA Adds Login.gov to Sweeping Bug Bounty Program

Participants can win between $150 and $5,000 for each bug they find.

Government Technology

Tech Moves: F5 hires information security executive; DomainTools hires to expand globally; and more

Seattle-based security technology company <b>F5 Networks</b> hired <b>Mary Gardner</b>, a veteran information security executive, to be its new chief information …

Washington State

The Pay What You Want Certified White Hat Hacker Bundle

Reading Time: 1 minute<p>With today’s Daily Deal, the Pay What You Want Certified White Hat Hacker Bundle, you decide how much you want to spend. So, …

Cool Stuff

What's Cooking With Caleb Sima

Security Pro File: Web app security pioneer dishes on his teenage security career, his love of electric scooters, Ace Ventura - and a new baby food …

Information Security

The Billion-Dollar Quest to Eliminate Smart Contract Bugs

Technology<p><b>You can’t have software without bugs. Every major piece of code is subject to extensive debugging, which is an inevitable part of the</b> …

Blockchain

Julianne Moore is All Smiles While Running Errands in NYC

<b>Julianne Moore</b> flashes a smile for the paparazzi as she runs a couple of errands on Monday afternoon (July 9) in New York City.<p>The 57-year-old …

Celebrity News

“Skyscraper” Sure Has a Lot of Mass Shootings for a Family-Time Adventure Movie

Twenty-three people get killed in the original <i>Die Hard</i>, a 1988 film rated R for its violence and swearing. I instantly lost track of the number of …

New York City

Daily Deal: Pay What You Want Certified White Hat Hacker Bundle

Pay what you want for the White Hat Hacker Bundle and you'll get access to the Web Hacking for Beginners course. If you beat the average price, you …

Wireless

Become a white hat hacker with this online course that's on sale

Nothing positive comes to mind when you hear the term hacker, right? You probably think of some hoodie-wearing Lisbeth Salander character who’s out …

Security

Here’s what you need to know about the Timehop data breach

Timehop, both an app and a company that was big on Facebook until Facebook Inc. copied it features via its own “On This Day” service in 2015 has been …

Social Media

'Ant-Man and the Wasp’: Marvel's Super-Scientists, Explained

<i>Spoilers ahead if you haven’t seen Ant-Man and the Wasp yet</i>.<p>Here’s a non-spoiler where Marvel’s <i>Ant-Man and the Wasp</i> is concerned: Scott Lang is no …

Comics

Four times smart locks went wrong

There's a lot to like in the idea of smart locks but there's been no shortage of recent incidents that might give you pause about buying in just …

White Hat

How To: Hack 200 Online User Accounts in Less Than 2 Hours (From Sites Like Twitter, Reddit & Microsoft)

Leaked databases get passed around the internet and no one seems to notice. We've become desensitized to the data breaches that occur on a daily …

Computer Hacking

How To: Hack Wi-Fi & Networks More Easily with Lazy Script

Wi-Fi tools keep getting more and more accessible to beginners, and the LAZY script is a framework of serious penetration tools that can be explored …

Computer Hacking

EHR Vendor Mistake Impacts 150,000 U.K. Patients

Case is Reminder to All Healthcare Entities About Vendor Risks Marianne Kolbasuk McGee (HealthInfoSec) • July 5, 2018<p>A coding mistake by an …

Cybersecurity

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense)

Windows 10 and macOS have poor reputations when it comes to customer privacy and user policies. In addition, our steady flow of hacking Windows 10 …

Linux

June's Cybersecurity Recap: The Evolving Cybersecurity Career Pathway

In June’s cybersecurity news, the cyberskills gap is growing and social engineering schemes like phishing attacks remain a top threat vector — …

Social Issues

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 2 (Network Attack Defense)

After installing Ubuntu as your primary OS, you should have protected against USB Rubber Ducky payloads, defended against hard drive forensics, and …

Linux

UK National Health Services shares confidential medical data due to 'coding error'

Confidential medical information relating to 150,000 patients of the United Kingdom’s National Health Service has been released due to what has been …

Online Privacy

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 3 (Application Hardening & Sandboxing)

Once you've installed Ubuntu with security in mind and reduced the possibility of network attacks on your system, you can start thinking about …

Linux

Norwegian Agency Dings Facebook, Google For "Unethical" Privacy Tactics

While GDPR is forcing large data-crushing service providers to be transparent around data collection and usage, some are still employing a number of …

Privacy

Locking Down Linux: Using Ubuntu as Your Primary OS, Part 4 (Auditing, Antivirus & Monitoring)

You've protected your Ubuntu system from physical attacks, annoyed network hackers, and sandboxed potentially malicious applications. Great! Now, the …

Linux

Ticketmaster Chat Feature Leads to Credit-Card Breach

Tens of thousands of people have been caught up in a data breach at Ticketmaster UK, which exposed credit-card and personal information for UK and …

Open Source Software

11 Free Computer Forensics Training Resources For IT Pros

Computer Forensics Training Resources for IT Pros<p>Credit: Shutterstock<p>Although lots of free information security training is readily available, the …

Forensics