security

  1. Carding 4 Carders

    How Tor Browser passed the strength test: security audit results

    Detailed analysis: what vulnerabilities were found in Tor? The developers of the popular tool for anonymous Internet surfing, Tor Browser, have released the results of an extensive security audit. The audit covered the main projects: Tor Browser, OONI Probe, rdsys, BridgeDB and Conjure. Experts...
  2. Carding 4 Carders

    StripedFly: how the malware deceived information security specialists and affected millions of victims

    A universal program in the cryptominer mask allows you to conduct cyber attacks of any type. Kaspersky Lab specialists have identified a complex malware campaign called StripedFly, previously unknown and extremely confusing. Since 2017, the operation has affected more than one million users...
  3. Carding 4 Carders

    Who will win the fight for your privacy: banks or security forces?

    The new bill raises many questions and debates. Russian banks have expressed their opposition to the bill proposing to provide law enforcement agencies with direct access to information systems and databases with customer information, the Association of Banks of Russia (ADB) reports in a letter...
  4. CarderPlanet

    iPhone security on the verge: a new 0day vulnerability caused massive attacks on users

    Apple urgently fixes a bug that allows you to take control of the device. Apple has released emergency security updates to address a new zero-day vulnerability that was exploited in attacks on iPhone and iPad users. In an official statement, Apple said that it is aware of the active...
  5. Carding

    Why are we being deceived? The unsightly side of security guides.

    Find out the truth behind the security guidelines. The cybersecurity instructions you receive at work may cause confusion? You are not alone. According to a recent study, there are a number of problems in the wording of these guidelines. The authors suggest simple measures to improve the...
  6. Carding

    Attack on the Paraguayan Police: stavka – the future of the country's security

    Data leaks can affect national security and international relations. More than 500,000 internal documents and images, as well as 175 GB of SQL databases, were stolen from the system of the National Police of Paraguay (Policía Nacional del Paraguay). Among the leaked data are documents from...
  7. Carding

    How ASUS disappointed its fans: three unacceptable mistakes in router security

    Update your firmware or your data is in trouble. Three critical remote code execution vulnerabilities were found in popular ASUS router models: RT-AX55, RT-AX56U_V2, and RT-AC86U. The defects will allow potential attackers to gain full control over devices if the user does not install the...
  8. Hacker

    Total FAQ on Network Security and Anonymity

    1. Complete anonymity does not exist in nature at all! "Complete anonymity" is not required, it is enough to confuse the chain in such a way that its unraveling is unprofitable and the effort spent does not pay off with the result. To reach this level, you do not need any special knowledge and...
  9. CarderPlanet

    Security and Privacy Apps for your Android!

    Good day! Today we have selected apps for you that will greatly enhance your security and privacy when using Android devices. In addition to protecting your personal data, applications will allow you to replace some of the Google services that most aggressively collect user information. Let's...
  10. B

    HOW TO DETECT SSH HONEYPOTS ?

    What are SSH honeypots? Honeypots are decoy servers or systems set up to gather information regarding an attacker or intruder into a system. They are designed to look vulnerable to attack, but once an intruder gains access to the system all of their actions are controlled and monitored. SSH...
  11. Lord777

    5 simple rules for telegram account security

    Although Telegram is a well-protected messenger - there was not a single leak or suspicion of cooperation with special services - there is always a human factor. To accurately protect yourself from account hijacking or theft of valuable data, follow these tips: 1. Urgently enable two-factor...
  12. B

    How to delete RDP logs?

    I need help regarding deleting RDP logs after using RDP. How can i manually delete RDP logs from my PC & is there any way to delete them automatically? And,for how many days a RDP can last?
  13. B

    Incognito window

    What is advisable? Incognito window or normal Window for Browser like Firefox. I use CCleaner after closing the browser.
  14. CreedX

    The best security apps for Android!

    F-Droid - analog to Play Market, but with free and open source apps. Private Location - a simple app to set up your location anywhere in the world and increase the overall privacy of your phone's location. KeePassDroid -the best program for securely storing passwords and sensitive data in...
  15. Teacher

    Online security and privacy

    Today's material is devoted to the most common channels for transmitting information on a home or partly corporate laptop, as well as the struggle for personal safety and anonymity. Content 1. How to protect your browser from data leaks. 2. Temporary mailboxes 3. How to get a virtual number for...
  16. Carding

    Carders defensive stance to enforce justice

    How carders build their line of defense when facing justice: Correct legend and testimony. It can happen to anyone. I accidentally lost my IP, made a call from a flashed SIM card, recognized my neighbor - no matter how, but I got burned. They came to you, and guys in uniform came to you. In...
  17. Carder

    Offline anonymity and security. How not to get into a mess?

    Good time of day. Last time I wrote about how you can be tracked using your own mobile phone, but this article will be a Supplement and will be devoted to aspects of psychological security and anonymization, which is inherently associated with offline, and also rather focused on beginners and...
  18. Carder

    Free courses on anonymity and security

    Paranoid II-course on anonymity and security (2020) Paranoid II-a logical continuation of the course on anonymity in the Paranoid network Instructor: ghost What the course is about: a set of measures to protect information, privacy, personal data protection, anonymity on the Internet and more...
  19. Carding 4 Carders

    Security and anonymity for Android

    With each everything on the network, more and more potential threats arise that can harm the security of our confidential data, therefore, today we decided to share with you a list of vital applications for your phone that will protect it from external intrusion and surveillance. Services: 1...
  20. Carder

    HOW TO BYPASS PAYPAL SECURITY VERIFICATION

    - Get the paypal login ready and connect state/country IP - Then open normal window on chrome and a private window (or use your phone for more stable) - Go to paypal.com & login on both browser at same time - Now, if you clicked it same time on both window… 1 Will Ask for security challenge and...

security

security

Share this tag

Top