privacy

What is private browsing?

Posted on

When you want to hide something that you do online, you use a private browsing mode like Incognito, Private Browsing, or InPrivate. However, do you know how private you are when you use this way of browsing the web? Can others still see what you are doing online? Also, do you know which browser is best at protecting […]

email

Secure Email Providers

Posted on

There have been numerous privacy scandals with large email providers over the past few years, prompting many to look for the best secure email that respects user privacy. Why switch to a secure email provider? With so many different types of users, there is no single “best secure email” service that will be the top […]

mobiles

Phone Hacking Fears and Facts

Posted on

The lack of security built into phone networks leaves callers vulnerable to snooping, but the growth of encrypted communications will help protect privacy. Apple’s ongoing standoff with the government over passcode-protected iPhones is still raising unprecedented alarms over smartphone security and privacy.  The good news: Although the SS7 system will indeed work for spying on […]

anonymity

The Evolution of Darknets

Posted on

To prevent the problems of customer binding, and losing business when darknet markets go down, merchants have begun to leave the specialized and centralized platforms and instead ventured to use widely accessible technology to build their own communications and operational back-ends. Instead of using websites on the darknet, merchants are now operating invite-only channels on […]

VPN

Illegal Websites

Posted on

Everything should have a starting point, and it all began with “Deep Web” and “Dark Web”.  Deep Web is something big that you can’t imagine, which is hidden in the dark side of the internet whose contents are not indexed by any standard search engines. According to the reports, only a 4% of the web is […]

software

Hashcat

Posted on

Hashcat is the world’s fastest and most advanced password recovery utility, supporting five unique modes of attack for over 200 highly-optimized hashing algorithms. hashcat currently supports CPUs, GPUs, and other hardware accelerators on Linux, Windows, and OSX, and has facilities to help enable distributed password cracking. Think your 12 character passwords are still strong enough? One […]

security

Password Stealers

Posted on

Password security has always been a challenge. Brute force attacks are constantly getting more powerful, but they aren’t the only threat you have to worry about. A range of password stealing malware continues to grow in popularity. These password stealers are each capable of stealing credentials and other information from a wide variety of programs. […]

security

Password Constraints

Posted on

You’re probably familiar with some of the most common requirements for creating passwords. A mix of upper and lowercase letters is a simple example. These are known as password constraints. To start, let’s look at the impact of an eight-character length constraint alone. There are 95^8 possible combinations of 8 characters. Just by requiring both uppercase […]

Technology

Shodan

Posted on

Shodan  is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client. This can be information about […]

mobiles

Clone A Phone

Posted on

It might surprise you, but there are plenty of ways to learn how to clone a phone without touching it. It doesn’t matter if you wish to clone an Android, Windows, or an iOS device – you can easily clone the target phone and obtain crucial information related to it. By exploiting some vulnerability on […]