Quantcast
Channel: Hakin9 – IT Security Magazine
Browsing all 612 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Rekono - Execute full pentesting processes combining multiple hacking tools...

Rekono combines other hacking tools and their results to execute complete pentesting processes against a target in an automated way. The findings obtained during the executions will be sent to the user...

View Article


Image may be NSFW.
Clik here to view.

API Key, a Key to Credential Leakage & Manipulation

Django, is a Python-based web framework that allows developers to easily create secure and maintainable websites. This free open source is one of the most popular Python frameworks because it provides...

View Article


Image may be NSFW.
Clik here to view.

Exploring the Heightened Importance of Cybersecurity in Mobile App...

Mobile app development needs to focus on cybersecurity, just as much as it does on functionality and flexibility, if not more so. It’s an inevitable aspect of app development that must be taken more...

View Article

Image may be NSFW.
Clik here to view.

Deception Technologies: Improving Incident Detection and Response by Alex...

According to the M-Trends 2021 report by FireEye, the median time for an attacker to remain unnoticed in an enterprise's infrastructure is 24 days. This is enough to identify the weakest points in the...

View Article

7 Tips to Build A Banking Application That Will Be User-Friendly

7 Tips to Build A Banking Application That Will Be User-Friendly According to Statista, 1.9 billion people globally use online banking services; the number is projected to reach 2.5 billion by 2024....

View Article


--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article

--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article

--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article


--- Article Not Found! ---

*** *** *** RSSing Note: Article is missing! We don't know where we put it!!. *** ***

View Article


What are the Common Security Weaknesses of Cloud Based Networks?

META: We’re breaking down what the most common security weaknesses are of the cloud and how to avoid these weaknesses. The cloud has been hugely impactful on the everyday running of many businesses....

View Article

E-Mails Leading to a Malicious Link | Client-Side Exploitation [FREE COURSE...

This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online course 'Client-Side Exploitation' by Krenar Kepuska. Dive in!

View Article

Main Tips for Students to Protect Data Privacy

Main Tips for Students to Protect Data Privacy As technology becomes increasingly prevalent in our daily lives, it is more important than ever for students to be aware of and protect their data...

View Article

Authentication Flood | Wireless Network Attacks [FREE COURSE CONTENT]

This video tutorial presents how to deal with e-mails leading to malicious links. It is a part of our online course 'Authentication Flood' by Saeed Dehqan. Dive in!

View Article


Image may be NSFW.
Clik here to view.

Weaponizing Raspberry Pi with The PenTesters Framework

Raspberry Pi Single Board Computers are used very frequently in security. The small and inexpensive units work very well for this function. One of the most popular usage cases is to install Kali Linux...

View Article

Image may be NSFW.
Clik here to view.

Exploiting SQL injection using acunetix vulnerability scanner and sqlmap

By Adam Karim SQL injection (SQLi) SQLi is the most well-known of all web application flaws and most web application security professionals have some familiarity with SQL injection flaws that allow a...

View Article


Image may be NSFW.
Clik here to view.

Hacking Destruction Algorithms

“Doublethink means the power to hold two contradictory beliefs in your mind simultaneously and accept both of them.” George Orwell Prejudice has existed since the creation of the land. “Wives submit...

View Article

Interview with Karan Dwivedi - For Hakin9 Magazine

[Hakin9 Magazine]: Hello, Karan! It means a lot to us that you agreed to the interview! It would mean a lot to us if you told us something about yourself. [Karan Dwivedi]: Thank you for having me! I...

View Article


Image may be NSFW.
Clik here to view.

A review of some encryption methodologies and an introduction to a new...

Encrypting information is not new; it's as old as the Roman Empire and even further back than that. Today the National Security Agency tries to decrypt information from our enemies and even in some...

View Article

Image may be NSFW.
Clik here to view.

File system fault in FAT32-formatted drives revealed by Morse-code directory...

The problem described can be reproduced in Microsoft Windows family of operating systems (i.e. Windows XP, Vista, 7, 8.1 Enterprise/Pro, 10 Enterprise 21H2, 11 Home 21H2). This is only a sample of...

View Article

APPLICATION SECURITY TESTING

Introduction The digital era has made the world seem compact. Things that used to take an entire day are now completed in a matter of seconds. However, the internet also created opportunities for...

View Article
Browsing all 612 articles
Browse latest View live