Hackers about hacking techniques in our IT Security Magazine

April 2014

30

Apr'14

AusCert 2014 Trusting Security

Dear Readers, We would like to advice you the conference AusCERT 2014 Trusting Security.     About the conference In …

Read More

30

Apr'14

Ingenious Things with Kali Linux

Ingenious Things with Kali Linux by Raheel Ahmad Backtracking Kali Linux will end up in the last release of Backtrack …

Read More

29

Apr'14

HackMiami Hackers Conference

Dear Readers, We would like to advice you the HackMiami Hackers Conference.      The HackMiami 2014 Hackers Conference seeks …

Read More

29

Apr'14

Interview with Care Direct SA Greece

Dear Readers, We want to introduce you the interview with Andreas Venieris- IT Director of Care Direct SA – a …

Read More

29

Apr'14

Using Social Media Threats for benefits

Dear Readers, New article connected with the issue Social Media- “Using Social Media Threats for benefits” Enjoy reading! Author: Gokula …

Read More

28

Apr'14

Logic Breaks Logic

The Logic Breaks Logic by Raheel Ahmad People – Process – Technology, your Internet industry is based on these three …

Read More

28

Apr'14

Reversing Cracking

Reversing Cracking by Andreas Venieris Everything published in this article is just for educational purposes and for “white” knowledge, that …

Read More

28

Apr'14

Cloud for dummies

Dear Readers, We want to introduce you new article “Cloud for Dummies” Enjoy reading! Author: Antonio Ierano “Cloud for dummies” …

Read More

24

Apr'14

Knowing the Heartbleed Bug

Knowing the Heartbleed Bug by Mirko Raimondi The Secure Sockets Layer (SSL) is a protocol described in RFC 6101, it’s …

Read More

23

Apr'14

CryptoLocker Ransomware: The Crime That Can Be Prevented

CryptoLocker Ransomware: The Crime That Can Be Prevented by Dr. Rebecca Wynn This week I received notification from a legal …

Read More