Security

Security

US Bans Sale Of Hacking Tools

Looks like things are heating up in cybersecurity, but why now? Time stamps: 0:00 Intro 0:24 Why Now? 0:56 The New Rules Are Complicated! 2:20 Why This Is Probably Pointless 3:42 Pegasus Spyware 4:36 Protect Your Passwords!

Read More
Blockchain Security

OpenSea Had A Malicious NFT Problem – ThreatWire

OpenSea had a malicious NFT problem, a twitch hack update, and whatsapp officially adds end to end encrypted backups! All that coming up now on ThreatWire.

Read More
Security

Hacking Out of a Network – Computerphile

Computerphile shows multiple ways to break through restrictions in a network* demonstrated by Dr Richard G Clegg of Queen Mary University London. *Please only try these methods on machines where you have permission.

Read More
Privacy Security

What Is a VPN and Which Should You Choose?

VPNs are often considered an essential part of your toolkit if you want to live a modern, privacy-conscious lifestyle… but most computer security experts will tell you that they’re not tools for privacy at all!? When you use a consumer VPN, the VPN company is able to see everything you’re doing. Many log and even […]

Read More
Linux Security

Linux Essentials for Ethical Hackers – Full InfoSec Course

In this Linux course, you will learn the 20% you need to know to be efficient with Linux. This course will teach all the common Linux skills used in cyber-security and ethical hacking. HackerSploit developed this course. Course Contents: (0:00:00) Introduction (0:01:56) Useful keyboard Shortcuts (0:08:52) File Management & Manipulation (0:32:18) File & Directory Permissions […]

Read More
Security

Ethical Hacker Full Course for Beginners

Simplilearn provides this free Ethical Hacking course What Is Ethical Hacking? Good question: Ethical Hacking is defined as the process by which system vulnerabilities are discovered to ensure system security. This is achieved with the help of hacking techniques and tools. An ethical hacker is a trained individual who carries out this duty. Ethical Hackers […]

Read More
Science Security

Is the Universe is Hostile to Computers?

Can tiny particles from distant galaxies trigger glitches that have caused plane accidents, election interference and game glitches.

Read More
Security Windows

CODE RED: The Billion Dollar Buffer Overflow & How it Worked

How does a buffer overflow work and what does it have to do with CODE RED, one of the biggest security holes ever found (so far)? Join retired Microsoft developer Dave Plummer as he explains how CODE RED was unleashed on the world and how it worked so that you can avoid the mistakes of […]

Read More