We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks …
Security
-
BrowserHow toLinuxSecurityWindows
Fix Java error Unsigned application requesting unrestricted access to system
by blackMOREby blackMORETried to login to one of my server that requires Java and immediately got this error: Unsigned application requesting unrestricted access to system. The following resource is signed with a …
-
NewsPasswordSecurityVideo
Pay the Ransom or Face the Music – Hackers Threaten Apple Over iCloud Compromised Accounts
by blackMOREby blackMOREIf you are an Apple user and thought that your data was secure, perhaps it’s time you retracted that thought. According to Motherboard, an Information and Technology Security magazine, a …
-
BINDDenial-of-Service Attack (DoS)HackingHow toPythonSecurityVideo
dns2proxy – Offensive DNS server post-explotation tool – DNS spoofing, phishing and pharming
by blackMOREby blackMOREdns2proxy is an offensive DNS server that offers various features for post-exploitation once you’ve changed the DNS server of a victim. This tools offers different features for post-explotation once you …
-
BrowserHow toLinuxNewsSecurityUSB
Encrypted EMail Service ProtonMail Opens Door for TOR Users
by blackMOREby blackMORELet’s admit it: Privacy and Security are the two elements that matter most on our cyber cruising. Anyone including the government that sleuths on our online activities and data is …