Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Cybersecurity
Bitcoin
Darknet
Hacking
ransomware
drugs
Bitcoin
Posts Tagged ‘Shodan’
Most Recent
 
Read More
September 19, 2016

How Cybercriminals Target Victims: Report Cites Top Information Resources

Cybercriminals, whose attacks cost organizations millions of dollars a year, do extensive research on their targets. They gather organizational and personal information before deciding which vulnerabilities to exploit.

SurfWatch Labs, a security consultancy, has released a report on research resources cybercriminals use. The purpose of the report is to provide organizations a tool to prevent cyber attacks. The report includes an overview of information resources cybercriminals use to target the victims. Knowing about these resources can help organizations defend against cyber attacks.

Adam Meyer

The majority of threat awareness training is [...]

188151
 
Read More
December 22, 2015

Iranian Hacking Of New York Dam Signals Wider Cyber Threat

A classified incident where Iranian hackers infiltrated a dam less than 20 miles from New York City two years ago underscores a major threat to the U.S. power grid, factories, pipelines, bridges and dams, according to a front-page story in today’s Wall Street Journal. The story notes the incident occurred amidst concerns that the Iranians had attacked U.S. banks.

The dam breach came a few years after U.S. spies damaged an Iranian nuclear facility using a computer worm.

Unlike a conventional war, a cyber attack can be hard to track. In the case of the New York dam, investigators first thought the intended target was a dam in Oregon.

Leon Panetta, then-U.S. Defense [...]

10212
 
Read More
December 17, 2015

University of Michigan and Google Are Mapping the Entire Known Web with Censys

Logging onto a terminal in 2015, it’s easy to forget what the Internet actually is: a massive, massive macro version of your home network. If you’ve got a phone and a computer connected to the web, that’s technically three devices, counting the router.

Now multiply that by many billions of times, and you’ve got the number of addresses that the Censys project is aiming to track, though not for arbitrary reasons. Rather, Censys is scanning the known web for security vulnerabilities, at least the obvious kinds that system administrators should know about.

The infrastructure for Censys, which is a University of Michigan project, is being provided by [...]

14208
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University