Posts

Showing posts from June, 2020

India China standoff live updates: India bans 59 Chinese apps including TikTok !?

Image
Border tensions between India and China continue, and several rounds of military-level talks have been unable to break the deadlock. India has rubbished China's claim of sovereignty over the Galwan Valley, and said that unilateral attempt to change status quo on LAC will not be accepted. Stay with TOI for live updates. Read more on Source : TOI

Find Social Media Profiles Using a Photo Only: Social Mapper

Image
Using Social Mapper we can don mass scan. Not only that the main function is we can find someone with the photo only. Yes,  Social Mapper  uses  facial recognition  to perform a scan. Let’s use the Social Mapper tool in our  Kali Linux  machine. Social Mapper is a Python-based open-source intelligence tool that correlates social media profiles via facial recognition. Social Mapper collects data from many popular social media like Facebook Instagram LinkedIn Google plus Twitter Vkontakte It also can collect information from microblogging websites like Weibo and Douban. This tool uses names and photos as input to scan social media profiles of the people on a mass scan. Join our Broadcast for latest updates on Whatsapp : Trojanfox Click to Join our team ->  http://bit.ly/trojanfox Social Mapper is aimed at penetration testers and red teams, they can use it to expand their target lists and find social media profiles. Social Mapper is created by Jacob Wilkin. Jacob presents this tool on 

The Future Is Coding: The Firmware and Software of Hardware Design

Image
Moore's Lobby Podcast Ep. 4 | The Future Is Coding: The Firmware and Software of Hardware Design EPISODE #4  /    44:23  /  11 hours ago  by  Dave Finch 1:18 Episode Sponsors:  Samtec ,   STMicroelectronics Electrical engineers are increasingly tasked with firmware and even software design—and it turns out it may be with pretty good reason. Are EEs ready? Welcome to the age of coding. Hardware design has changed a lot in recent years, in no small part because electrical engineers are increasingly required to take part in firmware and software design. In this episode of Moore's Lobby, host Dave Finch talks to two engineers about how their mega-companies rely on coding skills to make the best products possible.   A Big Thank You to This Episode's Sponsors Source : All About Circuits  <<Read more          

Monitor Other People Image Files over Network

Image
In our this detailed tutorial we are going to learn how attacker’s attacks on our devices and steal our personal images and how they make trouble in our personal life. To learn this dangerous technique completely please read till the end. Then we also learn how we can protect ourselves from this kind of attacks. How attackers do it? We will try this on our own environment and own network and try to steal private images of other devices from the Kali Linux environment. First, we open our ettercap graphical interface by using the following command: ettercap -G After using this command we can see our ettercap window as the following screenshot: Then we click on the   symbol to start the unified scanning. Hereby default the network interface is wlan0 means Wi-Fi networks. If we want to scan on ethernet then we need to choose eth0. In this tutorial, we sniff over Wi-Fi so we go with the default one. Then we search for hosts we click on   ፧ (3 dot menu) > Hosts > Scan for hosts It will

HOW ATTACKERS CONFUSE INVESTIGATORS WITH CYBER FALSE FLAG ATTACKS

Image
image : business.blogthinkbig.com Tuesday, July 7, 2020 11:00 AM - 12:00 PM PDT 60 MINUTES, INCLUDING Q&A During cybersecurity compromise investigations, incident responders are always asked the question “who did this to us and why?” To the extent that attribution matters in cybersecurity, false flag cyberattacks offer opportunities to misdirect investigators in both dimensions – the who and the why. In this webcast, we'll demonstrate techniques showing how attackers can plant forensic evidence, misdirecting investigators about their intentions and identities. Armed with this information, forensic investigators and incident responders will (hopefully) be more critical of the information discovered in their cases and dig a little deeper in investigations. Guest Presenter: Jake Williams Co-founder Rendition Infosec Jake Williams is the co-founder of Rendition Infosec and a principal consultant performing incident response, computer forensics, penetration testing, malware reverse