Apple has awarded a bug bounty hunter $100,000 for finding and reporting a severe security issue that could lead to …
Hacker leaks database of dark web hosting provider
Image: ZDNet (provided) A hacker has leaked online today the database of Daniel’s Hosting (DH), the largest free web hosting …
ADCollector – A Lightweight Tool To Quickly Extract Valuable Information From The Active Directory Environment For Both Attacking And Defending
ADCollector is a lightweight tool that enumerates the Active Directory environment to identify possible attack vectors. It will give you …
DroidFiles – Get Files From Android Directories
Get files from Android directories, internal and external storage (Pictures, Downloads, Whatsapp, Videos, …)Legal disclaimer:Usage of DroidFiles for attacking targets …
NCA launches UK ad campaign to divert kids searching for cybercrime tools
The UK’s National Crime Agency (NCA) has launched a new advertising campaign designed to divert young people searching for cybercrime …
Top 5 Effective Ways of Dealing with Cyber Bullying
Due to an increase in internet usage, many people can access the internet. Cyber is considered a crime. Most people …
Judge demands Capital One release Mandiant cyberforensic report on data breach
A judge has ruled that Capital One must release the forensic report prepared by Mandiant following a data breach, of …
MemoryMapper – Lightweight Library Which Allows The Ability To Map Both Native And Managed Assemblies Into Memory
Memory Mapper is a lightweight library which allows the ability to map both native and managed assemblies into memory by …
The Process of Investigating Cyber Crimes
Cybercrime is any criminal activity where the object as a target and/or tool is a computer or network device. Some …
Effective Ways to Bolster Your Home Network’s Defenses
In recent years, invading private networks has become a favorite pastime among cybercriminals. If unwelcome visitors are able to find …