Compromising Search Results

How To: The Beginner's Guide to Defending Against Wi-Fi Hacking

Hacking Wi-Fi is a lot easier than most people think, but the ways of doing so are clustered around a few common techniques most hackers use. With a few simple actions, the average user can go a long way toward defending against the five most common methods of Wi-Fi hacking, which include password cracking, social engineering, WPS attacks, remote access, and rogue access points.

How To: The White Hat's Guide to Choosing a Virtual Private Server

Conducting phishing campaigns and hosting Metasploit sessions from a trusted VPS is important to any professional security researcher, pentester, or white hat hacker. However, the options are quite limited since most providers have zero-tolerance policies for any kind of hacking, good or bad. After researching dozens of products, we came out with 5 potentials that are ideal for Null Byte readers.

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing attacks to compromise their online accounts, often targeting Google account credentials. To reduce this risk, Google created the Advanced Protection Program, which uses U2F security keys to control account access and make stolen passwords worthless.

How To: Access the Dark Web While Staying Anonymous with Tor

The dark web is an intimidating place for a newbie hacker, but it's a powerful tool once you've learned to navigate it safely. To help you out with that, this guide will cover some need-to-know information for traversing the dark corners of the internet while keeping your identity and data safe. (Hint: Using Tor is not enough.)

News: A Brief History of Hacking

Welcome back, my fledgling hackers! Hacking has a long and storied history in the U.S. and around the world. It did not begin yesterday, or even at the advent of the 21st century, but rather dates back at least 40 years. Of course, once the internet migrated to commercial use in the 1990s, hacking went into hyperdrive.

How To: Use Traffic Analysis to Defeat TOR

As was mentioned by the great OTW last week, TOR, aka The Onion Router, has had its integrity attacked by the NSA. In an attempt to reduce the anonymity granted by the service, the NSA has opened a great many nodes of their own. The purpose is presumably to trace the origin of a communication by compromising some entrance and exit nodes. Once both are compromised, it is much easier to correlate traffic with a particular individual.

How To: Safari for iPhone Lets Advertisers Track Your 'Clicks' — Here's How to Disable It

Apple wants to support the advertising economy, but its primary focus of late has been user privacy and security. In Safari, cross-site tracking, which lets content providers track you across websites and apps to show you more targeted ads, is disabled by default. However, content providers can get around that using less privacy-invasive ad measurements, but you can stop that too in iOS 14.5.

News: 30+ Privacy & Security Settings in iOS 12 You Should Check Right Now

There's always an iPhone in our list of top phones for privacy and security, due in large part to advanced security measures like Face ID, consistent iOS updates, and easy ways to prevent unwanted access and excessive data sharing. However, some of those options actually do the opposite and hinder security. It all depends on how you use your iPhone, but you should at least know everything available.

How To: The 5 Best Phones for Streaming Videos from Netflix, Hulu, YouTube & Amazon Prime

For many, phones are starting to replace televisions as the primary device for watching videos. Thanks to their portability and easy to use apps, it's often simpler to watch Netflix, Hulu, YouTube, or Prime Instant Video on the smaller screen. But not every phone is suited to fit this need, so we did some testing to find the best of the best when it comes to streaming videos.

News: The Eight Element Table

This is a sort of supplement to the Four-Element Table, with the additional four legs added for stability. The pipes are squished flat at the ends and riveted on, allowing this table to bear a much heavier load without compromising style.

Checkmate and... Checkmate: Bizarre Three-Way Chess Game

In a recent episode of The Big Bang Theory, character Sheldon Cooper designed a highly complicated three-person game of chess, with an odd-shaped nonagon board and two new pieces—serpent and old woman. Seemingly pioneering, in truth, three-player chess has been around since the early-1700s, with many different variations, most of which retain the basic game structure and sixteen pieces that each player controls.

News: Flaw in Facebook & Google Allows Phishing, Spam & More

Here's a nasty little Null Byte. An open redirect vulnerability was found in both Facebook and Google that could allow hackers to steal user credentials via phishing. This also potentially allows redirects to malicious sites that exploit other vulnerabilities in your OS or browser. This could even get your computer flooded with spam, and these holes have been known about for over a month.

News: Grand Theft Auto 4 Looks Like Gran Turismo 5 with iCEnchancer

Grand Theft Auto 4 was a landmark game. It gave yet another reboot to the already rebooted Grand Theft Auto series, arguably the most prestigious video game in the West. It has a 98 on Metacritic, making it by that measure the best game of modern times. Whatever your stance on the gameplay may be—which has received its fair share of flak in the three years since its release—the graphical steps that the team at Rockstar North took to create their fantasy replica of New York were a major step f...

How To: How Much Advertising Can a Free Game Site Have and Still Be Considered Indie?

Mediocre free Flash game websites are all too common. Many of them thrive off peddling the same few popular games to fans who have slim cause to pick one over the other. They thrive off the indifference of casual gamers and an environment that does not have to stand out to survive, only appeal to the lowest common gaming denominator with tower defense clones and brightly colored Peggle knockoffs. In that context, what Nitrome is doing seems downright commendable.

News: Top Vegetarian Spots near Santa Monica, CA

Samosa House This southern Indian market and restaurant is a stellar choice for any veggie. Their jackfruit is superb! If you've never tried it, please do. It looks like pulled pork, tastes like a seitan or chicken and is a great natural alternative to meat. Lucky you, they just opened up a second location up the street in Culver City! Also the Bharat Bazaar is a great spot to pick up spices, ginger beer and anything you're missing as far as an Indian grocery goes!

Next Page