Browsing tag

ethical hacking

Government Agency exposes millions of records of victims of natural disasters

By an oversight, the U.S. Federal Emergency Management Agency (FEMA) shared with a third party 2.3 million of records of natural disaster survivors, report authors of the book ‘Learn ethical hacking‘, in conjunction with experts from the International Institute of Cyber Security (IICS). FEMA accidentally shared personal details classified in twenty different categories; because of […]

Asus laptops users: Don’t update your software as new update has a backdoor

According to the authors of the book ‘Learn ethical hacking’, a group of hackers has infected hundreds of thousands of Asus computers using the company’s own update tool. According to specialists from the International Institute of Cyber Security, Asus, a company based in Taiwan, is one of the leading companies supplying portable computer equipment worldwide.  […]

Police organization suffers ransomware infection

According to specialists in ethical hacking training in India and the International Institute of Cyber Security, the Police Federation of England and Wales (PFEW) has put all their efforts in containing a ransomware attack that infected the systems of this organization (which it’s kind of a union of Police employees). Through their Twitter account, PFEW […]

PiewDiePie Ransomware: Encrypted files until YouTuber reaches 100 million subscribers

Subscribers to the PewDiePie YouTube channel have decided to take drastic steps to make the famous content creator consolidate as the user with the most subscribers of the video platform, mention experts in ethical hacking training in India and specialists from the International Institute of Cyber Security. As reported, some unknown user developed a ransomware […]

Tornado alert systems in Texas were hacked

On March 12th, around 2:00 A.M., the sound of emergency alerts awakened the inhabitants of two locations in Texas, U.S., all due to a hacking incident, reported ethical hacking training experts from the International Institute of Cyber Security. The small towns of DeSoto and Lancaster are in the area known as ‘Tornado Alley’, one of […]

Critical key exchange vulnerability in PuTTY

PuTTY, the SSH client has been updated with various security patches, while its main maintainers recently admitted that a critical vulnerability was corrected, reported online ethical hacking training experts from International Institute of Cyber Security. Among the fixes received recently PuTTY include new features to solve multiple vulnerabilities in the Telnet and SSH client; according […]

19-year-old ethical hacker is a millionaire now; thanks to his skills

Argentina’s Santiago Lopez is now a millionaire due to his prowess on identifying flaws in online services as well as software. The ethical hacker who uses the moniker @try_to_hack became part of HackerOne’s bug bounty program in 2015 and so far he has reported more than 1,670 unique bugs. Lopez identified bugs in the products […]

Kali Linux 2019.1 Released

Kali Linux 2019.1 is now available for download, updating many of its features, as well as introducing a few more. These include the open-source operating system, Kernal as it updates to version 4.19.13. This OS often receives contributions from thousands of programmers and companies. In addition, Kali condenses Antivirus evasion techniques within its Metasploit framework. Manager of […]

Coinbase grants $30k USD to the hacker who discovered a critical vulnerability

Technical details about the vulnerability are still unknown Coinbase, the popular cryptocurrency exchange, has just awarded a $ 30k USD bounty to a hacker for the discovery of a critical vulnerability on the platform. The security flaw has already been fixed, reported network security and ethical hacking specialists from the International Institute of Cyber Security. […]

Find vulnerability of any target to hack

Scanning is the initial phase of pentesting. Security researchers/ pentesters are very well aware of this phase. This is the phase where pentester spend most of the time. As this phase gives many information to pentester to prepare for further pentesting phases. There are many automated and manual tools which are used in pentesting. But […]

Ethical hacker faces prison time for exposing vulnerabilities in a telecom company

The company considers that the defendant exceeded the limits of the ethical hacking labor The Hungarian authorities are investigating an ethical hacker who discovered a critical vulnerability in the systems of telecommunication company Magyar Telekom at the beginning of last year. According network security specialists from the International Institute of Cyber Security, the company would […]

Hack secret keys, emails, subdomains, DNS of any company website

There are many tools which are used in gathering information. These tools gather information but are not able to gather some secret information of target. There are various way to exploit any target. But there are some vital information which comes really helpful while exploiting target, explain ethical hacking investigators. So today we will show […]

Fake any website in seconds Facebook, Snapchat, Instagram :-

Social engineering has always been on top list in hacking world. The most simple and efficient way to steal login credentials of the target using social engineering, as per ethical hacking specialists. There are tons of tool on the internet to create phishing pages. But it all depends on attacker that how attacker makes an […]

Facebook will pay you $40k USD for reporting bug

  The social network would pay up to $40k USD for reporting errors that allow a single account takeover In the middle of an image crisis because of critics of users and regulatory authorities on its data protection policy, Facebook has announced the expansion of its bug bounty program for experts in ethical hacking and […]

BabySploit – BabySploit Beginner Pentesting Framework

Tested on Kali Linux. Should work with all Debian based distros (and other ones if you have the right packages installed) BabySploit is a penetration testing framework aimed at making it easy to learn how to use bigger, more complicated frameworks like Metasploit. With a very easy to use UI and toolkit, anybody from any […]

Pwn2Own Tokyo 2018 ethical hacking event

Sponsors paid over $100k USD for iPhone X exploits The ethical hacking event Pwn2Own 2018, conducted in Tokyo, organized by Zero Day Initiative was a success, as reported by specialists in digital forensics from the International Institute of Cyber Security. During the event, participating cybersecurity specialists earned more than $300k USD for disclosing flaws that […]

The Best Ethical Hacking Courses for Programmers

Being on the internet is part of our day to day lives today. With the internet becoming so integral a part of our day to day lives, many things have become easier for us. You could do lots of things sitting in the comfort of your home, by using your computer or phone and with […]