neuromancer(25)•in #technology•3061 days ago⚠️ That's no font! HoeflerText attack switches from ransomware to RAT ⚠️A recent malware campaign targeting Google Chrome & Firefox has just switched gears; instead of afflicting victims' systems with Locky ramsomware it now install...3711$21.38neuromancer(25)•in technology•3061 days ago⚠️ That's no font! HoeflerText attack switches from ransomware to RAT ⚠️A recent malware campaign targeting Google Chrome & Firefox has just switched gears; instead of afflicting victims' systems with Locky ramsomware it now install...3711$21.38
coinidol(25)•in #cryptocurrency•3063 days agoMeet Hacken, The First Decentralized Marketplace For White Hat HackersHacken, the cybersecurity marketplace for bug bounties, announces its token sale, scheduled for 12 October, 2017. The project aims to create a collaborative def...361$0.00coinidol(25)•in cryptocurrency•3063 days agoMeet Hacken, The First Decentralized Marketplace For White Hat HackersHacken, the cybersecurity marketplace for bug bounties, announces its token sale, scheduled for 12 October, 2017. The project aims to create a collaborative def...361$0.00
pwnedu(25)•in #hacking•3061 days agoCovering Tracks on Windows - Link DumpWindows Post Exploitation - Covering Your Tracks My last link dump contained materials covering Windows Privilege Escalation. A logical next step would be to hi...15$0.00pwnedu(25)•in hacking•3061 days agoCovering Tracks on Windows - Link DumpWindows Post Exploitation - Covering Your Tracks My last link dump contained materials covering Windows Privilege Escalation. A logical next step would be to hi...15$0.00
jamesburchill(25)•in #selfies•3086 days agoHow To Hack LinkedIn Using Google (And Find Anyones Name Using Their Selfie)In this short video I show you how to use Google's image search to hack LinkedIn profiles so you can find the names of people "hiding" from you. Have fun! WARNI...13$0.00jamesburchill(25)•in selfies•3086 days agoHow To Hack LinkedIn Using Google (And Find Anyones Name Using Their Selfie)In this short video I show you how to use Google's image search to hack LinkedIn profiles so you can find the names of people "hiding" from you. Have fun! WARNI...13$0.00
pwnedu(25)•in #hacking•3088 days agoWindows Privilege Escalation ResourcesExploits BHaFSec's Window Privilege Escalation [This is GOLD] - http://www.bhafsec.com/wiki/index.php/WindowsPrivilegeEscalation DeleteExpiredTaskAfter - ...12$0.00pwnedu(25)•in hacking•3088 days agoWindows Privilege Escalation ResourcesExploits BHaFSec's Window Privilege Escalation [This is GOLD] - http://www.bhafsec.com/wiki/index.php/WindowsPrivilegeEscalation DeleteExpiredTaskAfter - ...12$0.00
odinthelibrarian(25)•in #news•3090 days agoThe Arrest of MalwareTech (Marcus Hutchins)The Arrest of MalwareTech (Marcus Hutchins) [EDIT] Donations For MalwareTech's Legal Fees Can Be Made HERE. I've been putting off this post for a while, for var...2710$5.99odinthelibrarian(25)•in news•3090 days agoThe Arrest of MalwareTech (Marcus Hutchins)The Arrest of MalwareTech (Marcus Hutchins) [EDIT] Donations For MalwareTech's Legal Fees Can Be Made HERE. I've been putting off this post for a while, for var...2710$5.99
o1o1o1o(25)•in #security•3097 days agoFuzzer project finds secret instructions on Intel processorsThe sandsifter project has found undocumented Intel x86 processor instructions that have been kept secret by Intel. It does this by testing millions of instruct...92$0.00o1o1o1o(25)•in security•3097 days agoFuzzer project finds secret instructions on Intel processorsThe sandsifter project has found undocumented Intel x86 processor instructions that have been kept secret by Intel. It does this by testing millions of instruct...92$0.00
pwnedu(25)•in #python•3097 days agoSteemit Forensics with PythonAbout a week ago, @JacKeown posted a thread titled Steemit-Trail Conspiracy?! which discusses a large number of upvotes and high curation rewards very quickly. ...23$0.00pwnedu(25)•in python•3097 days agoSteemit Forensics with PythonAbout a week ago, @JacKeown posted a thread titled Steemit-Trail Conspiracy?! which discusses a large number of upvotes and high curation rewards very quickly. ...23$0.00
pwnedu(25)•in #linux•3097 days agoHow do you change your DNS settings in Linux/Windows?If you did not catch my post of information security job interview questions, you might want to give it a quick glance. While the majority of questions are secu...41$0.00pwnedu(25)•in linux•3097 days agoHow do you change your DNS settings in Linux/Windows?If you did not catch my post of information security job interview questions, you might want to give it a quick glance. While the majority of questions are secu...41$0.00
hallow(25)•in #technology•3099 days agoSteganography - Hide important documents in imagesSo you probably wonder a lot of times where you should store your passwords or all those codes and pins that you only need so often... Why not hide all that in ...613$0.00hallow(25)•in technology•3099 days agoSteganography - Hide important documents in imagesSo you probably wonder a lot of times where you should store your passwords or all those codes and pins that you only need so often... Why not hide all that in ...613$0.00
somecoolname(25)•in #technology•3099 days agoDEF CON Hacking Conference - Las Vegas 2017https://steemitimages.com/DQmeqkjFZCCjAVqJxgUcjkqWUBvB3yAXpQNgrimxYijCTr2/cover3.jpg Image from https://pixabay.com DEF CON 25, the 25th addition to the hacking...166$0.42somecoolname(25)•in technology•3099 days agoDEF CON Hacking Conference - Las Vegas 2017https://steemitimages.com/DQmeqkjFZCCjAVqJxgUcjkqWUBvB3yAXpQNgrimxYijCTr2/cover3.jpg Image from https://pixabay.com DEF CON 25, the 25th addition to the hacking...166$0.42
pwnedu(25)•in #asksteemit•3101 days agoAre open-source projects more or less secure than proprietary ones?I just recently posted on my blog a long list of information security job interview questions. My intentions were, and still are, to begin sharing MY answ...210$0.00pwnedu(25)•in asksteemit•3101 days agoAre open-source projects more or less secure than proprietary ones?I just recently posted on my blog a long list of information security job interview questions. My intentions were, and still are, to begin sharing MY answ...210$0.00
voidfire(25)•in #technology•3101 days agoFor those who want to be a hacker but have no idea where to startA hands-on post aimed at giving you the exposure and the experience you need to get started. I’ll guide you through the process of creating a virtual lab and se...45$0.00voidfire(25)•in technology•3101 days agoFor those who want to be a hacker but have no idea where to startA hands-on post aimed at giving you the exposure and the experience you need to get started. I’ll guide you through the process of creating a virtual lab and se...45$0.00
pwnedu(25)•in #security•3101 days agoInformation Security Job Interview QuestionsInfoSec Job Interview Questions. At least try to be prepared.Job interviews are always nerve wracking. When it comes to the InfoSec industry, they can be even m...52$0.00pwnedu(25)•in security•3101 days agoInformation Security Job Interview QuestionsInfoSec Job Interview Questions. At least try to be prepared.Job interviews are always nerve wracking. When it comes to the InfoSec industry, they can be even m...52$0.00
docdelux(25)•in #conspiracy•3105 days agoTHE GREY WORLD ORDER - How the "education" system breeds sameness - And the great "like" conspiracy“What did one mirror see in the other? Nothing.” ~ Khang Kijarro Nguyen I present here a gift to my fellow millennials, a look into the structure of the mind co...9534$18.69docdelux(25)•in conspiracy•3105 days agoTHE GREY WORLD ORDER - How the "education" system breeds sameness - And the great "like" conspiracy“What did one mirror see in the other? Nothing.” ~ Khang Kijarro Nguyen I present here a gift to my fellow millennials, a look into the structure of the mind co...9534$18.69
wealthyhustler(25)•in #news•3106 days agoLINKIN PARK LEAD VOCALIST CHESTER BENNINGTON CONFIRMED DEADFYI: I know Wealthy Hustler covers money-making news, reviews, guides, and motivational topics, but we are huge fans of Linkin Park, so we had to post this. Thi...1411$0.34wealthyhustler(25)•in news•3106 days agoLINKIN PARK LEAD VOCALIST CHESTER BENNINGTON CONFIRMED DEADFYI: I know Wealthy Hustler covers money-making news, reviews, guides, and motivational topics, but we are huge fans of Linkin Park, so we had to post this. Thi...1411$0.34
v4vapid(25)•in #weapons-smuggling•3107 days agoAnonymous Bulgaria - "Silkway Airlines Helps Terrorists" - New 313Mb RAR File Leakhttps://pbs.twimg.com/profileimages/874794702402441216/sAwNEzZC.jpg Anonymous Bulgaria Twitter: https://twitter.com/anonbg The Data Dump details an enormous ill...13838$41.37v4vapid(25)•in weapons-smuggling•3107 days agoAnonymous Bulgaria - "Silkway Airlines Helps Terrorists" - New 313Mb RAR File Leakhttps://pbs.twimg.com/profileimages/874794702402441216/sAwNEzZC.jpg Anonymous Bulgaria Twitter: https://twitter.com/anonbg The Data Dump details an enormous ill...13838$41.37
pwnedu(25)•in #hacking•3107 days agoThe Conscience of a Hacker - Written on January 8, 1986Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They...44$0.03pwnedu(25)•in hacking•3107 days agoThe Conscience of a Hacker - Written on January 8, 1986Another one got caught today, it's all over the papers. "Teenager Arrested in Computer Crime Scandal", "Hacker Arrested after Bank Tampering"... Damn kids. They...44$0.03
mrosenquist(25)•in #security•3108 days agoThe Next Cybersecurity ChallengeRole Change: AI Cybersecurity Strategist I am excited to announce I am taking a new role in cybersecurity. Always in pursuit of great thought-leadership c...389$8.69mrosenquist(25)•in security•3108 days agoThe Next Cybersecurity ChallengeRole Change: AI Cybersecurity Strategist I am excited to announce I am taking a new role in cybersecurity. Always in pursuit of great thought-leadership c...389$8.69
pwnedu(25)•in #technology•3108 days ago6 Damaging things entrly-level cybersecurity job-seekers doWe have all heard that the number of "Cyber Security" job-openings continues to outpace the number of job-seekers. While we do continue to see the number of inf...30$0.06pwnedu(25)•in technology•3108 days ago6 Damaging things entrly-level cybersecurity job-seekers doWe have all heard that the number of "Cyber Security" job-openings continues to outpace the number of job-seekers. While we do continue to see the number of inf...30$0.06