Menu
Home
Forums
New posts
Search forums
What's new
New posts
New media
New media comments
New resources
New profile posts
Latest activity
Media
New media
New comments
Search media
Resources
Latest reviews
Search resources
Members
Current visitors
New profile posts
Search profile posts
Log in
Register
What's new
Search
Search
Search titles only
By:
New posts
New media
New media comments
New resources
New profile posts
Latest activity
Menu
Log in
Register
Install the app
Install
Home
What's new
JavaScript is disabled. For a better experience, please enable JavaScript in your browser before proceeding.
You are using an out of date browser. It may not display this or other websites correctly.
You should upgrade or use an
alternative browser
.
Latest activity
What's new
New posts
New media
New media comments
New resources
New profile posts
Latest activity
Father
posted the thread
XXE injections: Detection and prevention
in
Trash
.
Today, XML is one of the most widely used languages in the world for storing and transporting data. XXE is an injection of external XML...
May 3, 2024
Father
posted the thread
Sniffing attacks are becoming a thing of the past. Or not?
in
Trash
.
It would seem that all digital information transmission channels are already encrypted, and some even twice. Intercepting other people's...
May 3, 2024
Father
posted the thread
EternalBlue: what is known about the most high-profile exploit in history
in
Trash
.
Russia ranked second in terms of the number of systems that remain vulnerable to a critical exploit. How EternalBlue works and what it...
May 3, 2024
Father
posted the thread
A hat for each hacker: color differentiation of hacker hats
in
Trash
.
If you believe the character of the movie master George Danelia, hackers have a goal and they are definitely not in danger of extinction...
May 3, 2024
Father
posted the thread
"Cryptographer" attack: we save what we can
in
Trash
.
Cybercriminalists usually unravel the traces of hacker activity, but sometimes resist attacks that continue to develop "here and now"...
May 3, 2024
Father
posted the thread
Three questions for 3D Secure, or How the protocol will be changed in the future
in
Trash
.
Global cybercrime is growing. Cybersecurity Ventures predicts that online fraud damage will reach $8 trillion in 2023 and increase to...
May 3, 2024
Father
posted the thread
How two bloggers paralyzed all illegal call centers in India
in
Trash
.
Phone scammers are often trolled. In Russia, this is done by one in five subscribers, according to a survey conducted by Kaspersky Lab...
May 3, 2024
Father
posted the thread
TOP companies whose vulnerable mobile apps caused real harm to their business
in
Trash
.
The absence of security issues in mobile applications is no less important than the security of the server side. This statement should...
May 3, 2024
Father
posted the thread
Break — not build: what goals hackers choose in Russia
in
Trash
.
The path of an information security incident to widespread fame is thorny. While the world is discussing data leaks from the next major...
May 3, 2024
Father
posted the thread
Cybercrime-as-a-service: How the Custom cybercrime Market works
in
Trash
.
In recent years, to organize a cyberattack, you no longer need to understand malicious software and the design of security systems. The...
May 3, 2024
Father
posted the thread
Zero Trust: a new approach to information security
in
Trash
.
In the modern world of information technology, cyber attacks are becoming more sophisticated and complex. Traditional methods of data...
May 3, 2024
Father
posted the thread
Unauthorized access: the concept, types and primary sources of problems
in
Trash
.
Unauthorized access to information is a problem that should not be underestimated. If the data is accessed by someone other than the...
May 3, 2024
Father
posted the thread
Not all cryptocurrencies are useful. How they are used, hacked, and criticized.
in
Trash
.
How relevant are virtual safes for protecting confidential data? Do they guarantee 100% security? And what hacking methods are used by...
May 3, 2024
F
Francki
replied to the thread
EMV Reader Writer Software v8
.
May 3, 2024
Father
posted the thread
Dig deep. How attackers use network worms today.
in
Trash
.
The triumphal march of WannaCry and Petya across the planet took place five years ago. Since then, there has been much less high-profile...
May 3, 2024
Home
What's new
Top