Hacking

Let's Talk About Your Passwords

For years, security experts have recommended complexity as a measure of strength. Your password should contain double-digit characters. Your password should contain symbols, numbers, and letters. Your password should utilize upper and lowercase letters. Shuffle in some randomness, change them periodically and finally, your password passes the minimal requirements of what is considered “secure.” But now your password is difficult to type and even harder to remember. Which would be

DOWNLOAD: Google Hacking for Penetration Testers

Google has a set of advanced search operators which can be used to find interesting information about a target website or domain. Our tool aggregates a couple of useful search expressions (Google dorks) that you can use to extract ‘juicy’ data from Google. Every penetration test should start with a passive reconnaissance phase. Since public search engines have gathered huge amounts of information about almost every website from the Internet,

Tax Identity Theft: Safety Tips

Tax Identity Theft Tax identity theft occurs when a perpetrator uses someone else’s Social Security Number (SSN) to file a felony tax return to the Internal Revenue Service (IRS) to receive a tax refund. This type of crime is also known as stolen refund fraud. Other varieties of tax identity theft include falsely claiming dependents, using a deceased person’s taxpayer information, or earning wages under another person’s SSN. Tax identity

Facebook Password Stealing Apps Found on Android Play Store

Even after many efforts made by Google last year, malicious apps always somehow manage to make their ways into Google app store. Security researchers have now discovered a new piece of malware, dubbed GhostTeam, in at least 56 applications on Google Play Store that is designed to steal Facebook login credentials and aggressively display pop-up advertisements to users. Discovered independently by two cybersecurity firms, Trend Micro and Avast, the malicious apps disguise as various

DOWNLOAD: The 7 Types of Highly Effective Hackers

Digital Transformation: is impacting every aspect of business—shaping growth, transforming products, optimizing operations, and empowering employees. But with these extraordinary opportunities comes many questions about how IT leadership can effectively evolve their organizations, while still securing their data against the threat of increasingly severe cyberattacks. THE THREAT LANDSCAPE. The rapidly dissolving IT perimeter has created new targets for hackers. And hackers are becoming much more skilled and organized. As a

Muslim Activists Hacked Isis Mailing List Hours After Terrorists Claimed it was Unhackable

Muslim hackers have attacked Isis’s propaganda network and published a list of almost 2,000 subscribers’ email addresses in the latest blow to the online “caliphate”. After numerous cyber attacks and official takedowns targeting its Amaq “news agency”, Isis issued a message on Friday night claiming it had increased security. “In response to recent events, we have imposed more stringent security measures on our systems,” said the email in Arabic. “We can now handle