Some readers ask me how a hacking tool like Cain & Able can be legal? I always reply, most malicious hackers don’t use Cain & Able. They already have their hacking tools. Cain & Able just makes it ...
In the cyber-security field, the term OST refers to software apps, libraries, and exploits that possess offensive hacking capabilities and have been released as either free downloads or under an open ...
A large scale hacking campaign is targeting governments and university websites to host articles on hacking social network accounts that lead to malware and scams. BleepingComputer first learned about ...
What if the tools you use to test vulnerabilities could turn against you? Ethical hacking is a double-edged sword—on one hand, it’s a vital skill for identifying and fixing security flaws; on the ...
Version 3.0 of BackTrack has been released. BackTrack is a Linux-based distribution dedicated to penetration testing or hacking (depending on how you look at it). It contains more than 300 of the ...
Cybercriminals are supercharging their hacking skills, a new report says. The widespread availability of hacking tools in the cybercrime ecosystem is being driven by widespread malware piracy or ...
For the past years, a mysterious group has been churning out trojanized hacking tools on an almost daily basis, tools that are meant to infect fellow hackers and gain access to their computers.
More than four years after a mysterious group of hackers known as the Shadow Brokers began wantonly leaking secret NSA hacking tools onto the internet, the question that debacle raised—whether any ...
What if you could turn a pocket-sized device into a powerful cybersecurity tool with just a few affordable components? Meet Bjorn: a compact, Viking-themed hacking tool that transforms a Raspberry Pi ...