🌐 Fake Wi-Fi access points.
It is necessary to note one more risk factor (and for some, an opportunity) when using Wi-Fi technologies: fake access points. Attacks of this type have been carried out for about 15 years (the first known case was the use of a tool called "Jasager" in 2008), and are very simple: firstly, it is not difficult to develop a tool for such an attack on your own, and secondly, a number of relevant devices are available for sale (for example, Wi-Fi Pineapple).
Hackers from TurkHackTeam claimed responsibility for a cyber attack on the website of the Swedish parliament in protest against the burning of the Koran, demanding an apology. Judging by the tweets, hackers are attacking everything in a row: telecom, banks, online medical journal sites and the subway.
Secret documents of the Taiwan National Security Bureau (NSB) can be purchased on breached for $150,000.
Taiwan's main intelligence agency is investigating a possible leak, but so far has not confirmed the authenticity of the documents appearing on the darknet.
Changing your voice 💻
People often change their voice on audio recordings — to preserve anonymity or just to make fun of friends. For example, to say something frightening in the voice of a monster.
🔎 Scanners Box. Scanners for every taste and color.
• There are no universal tools, and vulnerability scanners are no exception to this rule. Scanners are available with a free license and commercial. As you have already guessed, our channel is aimed at covering open source software and publishing material for free, which is why today I will share with you an excellent resource where various scanners are collected for any need.
« May 2024 » | ||||||
---|---|---|---|---|---|---|
Mon | Tue | Wed | Thu | Fri | Sat | Sun |
1 | 2 | 3 | 4 | 5 | ||
6 | 7 | 8 | 9 | 10 | 11 | 12 |
13 | 14 | 15 | 16 | 17 | 18 | 19 |
20 | 21 | 22 | 23 | 24 | 25 | 26 |
27 | 28 | 29 | 30 | 31 |