As the saying goes, “Follow the money.” Regardless of one’s philosophical argument on the merits of a decentralized currency controlled by the masses and not a single government entity, criminals are utili
Plenty of ways to abuse GDPR with Social Engineering from pretending to be someone else and either asking to receive or change personal data, or one could in essence perform a DoS attack by submitting numerous data requests for all data for a number of individuals from a given company (EX: from a competitor).
20 Years Ago, Some Hackers Visited Congress…
May 19th, 1998. I was just wrapping up my first year of college. My grades were terrible. Instead of going to classes, I had been huddled in my tiny dorm room with t
43 years ago, a small team led by Chuck Peddle changed the way society computes today. In 1975, encased in plastic, this 40-pin DIP 8-bit microprocessor, known as the MOS Technology 6502, made its debut. Why
J0hn_D0ugh$ – So there I was once again enjoying my victory. I wasn’t technically done yet, however all of the hard stuff had already been done. I’m not a hacker just for the money. I’ve made enough of that alrea
Al writes, “Learn to Program. For Free. Learning to program makes you a smarter and more capable human being. Computers are not only the most common tool we encounter in our day-to-day lives, but also the most powerful. Even if your plans don’t include becoming a software…[Read more]
A great next step is Metasploitable3, a VM that is built from the ground up with a large amount of security vulnerabilities. It is intended to be used as a target for testing exploits with Metasploit. https://github.com/rapid7/metasploitable3
An anonymous report claims that a ton of your company’s customer data has been exposed. A sense of calm is in the air as you enact your vulnerability disclosure policy. You save the day, get a promotion and r
The Ethical Hacker Network (EH-Net) is proud to be part of the eLearnSecurity family.