Tutorials
 
How to hack
 
A menacing hand'€™s shadow on a computer keyboard in front of printed computer data. Dramatic light, high contrast.
 
Hacker hands
 
password typist
 
virtual private network (VPN)
Hacked’s Wiki
CCN.LA
Trending Topics
Posts Tagged ‘Wordpress’
Most Recent
 
Read More
February 21, 2016

Linux Mint Website Hacked: Motive Unknown

Hackers breached the Linux Mint website, Linux noted in a blog posting today. The Linux Mint 17.3 Cinnamon is the only compromised edition to the best of the company’s knowledge. Users who downloaded another edition or release are not affected. Users who downloaded via a direct HTTP link or via torrents are not affected either.

Since the breach occurred today, it should not affect users who downloaded the edition on Feb. 20.

Linux Gives Corrective Action

Users who still have the ISO file are instructed to check the MD5 signature posted on the blog with the “md5sum yourfile.iso” command where “yourfile.iso” is the ISO name. The blog page lists the valid [...]

15318
 
Read More
October 20, 2015

Introducing: Dr. Deniz Zeynep

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

It is a long established fact that a reader will be distracted by the readable content of a page [...]

2664
 
Read More
October 20, 2015

LMS WordPress plugin

Lorem Ipsum is simply dummy text of the printing and typesetting industry. Lorem Ipsum has been the industry’s standard dummy text ever since the 1500s, when an unknown printer took a galley of type and scrambled it to make a type specimen book.

It has survived not only five centuries, but also the leap into electronic typesetting, remaining essentially unchanged. It was popularised in the 1960s with the release of Letraset sheets containing Lorem Ipsum passages, and more recently with desktop publishing software like Aldus PageMaker including versions of Lorem Ipsum.

It is a long established fact that a reader will be distracted by the readable content of a page [...]

2553
 
Read More
September 18, 2015

Hijacked WordPress Websites Infect Visitors with Malware

Thousands of websites that run the content management system WordPress have been hijacked by hackers to infect unsuspecting visitors with malware exploits. Although the entire campaign was initiated 15 days ago, its activity has increased tremendously in the past 2 days, as the number of websites being hijacked per day increased from 1000 to 6000.

The purpose of hijacking these websites is to use them as relays to redirect any visitor to a server which hosts an attacking code that is provided by the Nuclear Exploit Kit. The method used to exploit this vulnerability to cause damage to the user’s system and data depends on the operating system as well as the apps that are [...]

16761
Tutorials
 
How to Hack
 
How Cybercriminals Target Victims: Report Cites Top Information Resources
Knowledge Base
 
Freeware
 
Malware
Press Releases
 
eSentire Partners with Carbon Black to Provide Endpoint Detection Capabilities to the Midmarket
 
SecurityScorecard Announces Data Science Partnership with Columbia University