Pentagon Impedes 36 Million Malicious Emails Each Day
The Defense Information Systems Agency conducts an assessment of DoD web browsing practices to determine the utility of bandwidths.
The US navy spends around $160...
AI composes an Eurovision song
A song by the name "Blue Jeans and Bloody Tears" has been algorithmically generated by a deep learning cloud-based AI which was fed thousands...
Child Pornography Website Taken Down from Dark Web
One of the most nefarious child pornography website which went by the name of “Welcome to Video” has been taken down and seized. Reportedly,...
Gradient App: Internet’s new celebrity obsession
Adding to the slew of gender-swapping, an ageing app we have a new app in town, Gradient. The app changes you into a celebrity...
Bitcoin Robbery Through Fake Tor Browser
Through the years, Bitcoin and Tor have gone hand in hand due to their assurance of anonymity and privacy. But it seems that in...
The Fascinating Hacker Tools of Mr. Robot
Hacking, for the most part in popular culture, has always been misrepresented. The producers of these media focus more on getting the typical "oh...
Google Play Store: A hub for spreading malware?
A report by Russian security firm Doctor Web has suggested that several of the Google Play Store's apps were spread malware known as "The...
Why not hack a hacker?
Tobias Fromel, A Germany-based programmer whose files were encrypted through Muhstik ransomware. Well, the hacker who hacked the hacker, I know pretty confusing. He...
Best Hacking Documentaries That You Should Watch Right Now
In order to become an ethical hacker in the 21st century, you should know some coding laterally with good inspiration.
Reverse Shell Cheat Sheet
If you’re lucky enough to find a command execution vulnerability during a penetration test, pretty soon afterward you’ll probably want an interactive shell.
If it’s not possible...