The Pirate Bay is in hot water once again – This time the reason is the Netherlands where authorities have blocked The...
DNS requests are one of the elements that most often spy on third-party applications and services. Every time we visit a website,...
LuLu is the free open-source macOS firewall that aims to block unauthorized (outgoing) network traffic, unless explicitly approved by the user: Full...
NetRipper is a post exploitation tool targeting Windows systems which uses API hooking in order to intercept network traffic and encryption related...
On January 10, Cisco’s officially released its software platform Encrypted Traffic Analytics (ETA) that can keep a check on network packet metadata...
dnscap is a network capture utility designed specifically for DNS traffic. It produces binary data in pcap(3) and other format. This utility is similar to tcpdump(1),...
Google, Facebook, Apple, and Microsoft all affected by “intentional” BGP mishap. Traffic sent to and from Google, Facebook, Apple, and Microsoft was...
A traffic sign near North Central Expressway in Dallas was hacked by unknown perpetrator on Friday (November 8th) night and defaced with an obscene...
Bro is a passive, open-source network traffic analyzer. It is primarily a security monitor that inspects all traffic on a link in depth...
Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of...
According to cyber-security researchers Frank Piessens and Mathy Vanhoef from Belgium’s Katholieke Universiteit Leuven, there is a dangerous flaw in the WPA2...
Nameles provides an easy to deploy, scalable IVT detection and filtering solution that is proven to detect at a high level of...
Metadata from web traffic generated by smart devices installed in a home can reveal quite a lot of information about the owner’s...
A renowned privacy group Center for Democracy & Technology (CDT) has accused Hotspot Shield VPN developed by AnchorFree, Inc. of violating user privacy by...
Defcon is the most important event for the DIY hacking community and this year too, the conference was held in the same...
In this blog post, we will present a new technique for domain fronting, which enables attackers to abuse Content Delivery Networks (CDNs) to...
On July 7, French domain registrar Gandi lost control over 751 customer domains, which had their DNS records altered to point incoming...
SSL is one the best ways to encrypt network traffic and avoiding man in the middle attacks and other session hijacking attacks....
WikiLeaks dumped today the documentation of two CIA hacking tools codenamed BothanSpy and Gyrfalcon, both designed to steal SSH credentials from Windows...
According to the latest analysis, the NSA has media secrets “detour parts of Internet traffic that move in the global communication cables,” which...
WikiLeaks Revealed another Secret Document of CIA Malware called “OutlawCountry” that targets Linux Running Machines which Control and Redirect all outbound network...