By: The Rapture and fellow contributing Cybrarians Today’s Estimated Link Count: 1470 Updated 11/10/17 I will continue to keep this article up to date on a fairly regular basis. (update: I have been working a lot in the last year, and have so much I need
Read more →Did someone share a Google Doc with you? If yes, you might be one of the millions of internet users who fell victim to this scam campaign. In the last few days, a lot of people received emails from their contacts with a seemingly normal and legitimate invitation
Read more →Today I’ll show you how to be more efficient and faster when you want to code. My secret is Atom, an open source text editor, used by the majority of elite coders under the same vim, sublime text etc. Atom has the particularity to contain thousands of
Read more →Http proxy protection is a commonly used protection method that will mask a hosts location through the use of intermediary servers. The application Websploit has a very powerful tool that will help a penetration tester resolve an Http proxy protected website into host locations. This is the
Read more →Exploit Kits (EK’s) are a serious cyber threat today, estimated to be responsible for the vast percentage of malware infections worldwide. Exploit Kits are currently distributed through both public and underground sources. They appeal to a wide range of audiences, from inexperienced hackers to black hat cybercriminals.
Read more →Recently in the news, there have been many reports that say that the FBI is fighting Apple. FBI stated that they want Apple to create a backdoor for Apple devices to catch terrorists. The FBI even pressured Apple, but they responded with a public letter stating that
Read more →