Month: October 2020

WAN….it’s not the internet!! (sometimes) // FREE CCNA // EP 8

the WAN…the Wide Area Network….it’s not the internet…not always. GET READY FOR YOUR CCNA: https://bit.ly/bosonexsimccna (Boson ExSim) (affiliate) **Sponsored by Boson Software It’s time to get your CCNA! ————————————————— ►Watch the whole course: https://bit.ly/nc-ccna ►CCNA Courseware: http://bit.ly/boson_cw (Boson) (Affiliate) ►CCNA...

/ October 31, 2020

Seatbelts, Airbags and your Cybersecurity

Seatbelts are something we take for granted today with well over 90% of US drivers using them. Airbags are similar – we don’t do anything, but they are there if we need them. When you think about airbags  though, they...

/ October 29, 2020

Snap’s Security Team on Nearly 6 Years of Collaborating with Hackers

As a popular camera and messaging platform, Snapchat is responsible for properly handling data for 249 million users daily. The Snap bug bounty program launched in January 2015 to encourage hackers to surface vulnerabilities so they could be safely resolved....

/ October 29, 2020

Organizations Paid Hackers $23.5 Million for These 10 Vulnerabilities in One Year

In times of uncertainty, security becomes an ever more pressing priority. The stakes are high: organizations are more reliant on technology than ever and anyone relying on technology can lose everything in a data breach. But some of the most...

/ October 29, 2020

Phishing attacks are SCARY easy to do!! (let me show you!) // FREE Security+ // EP 2

How do hackers launch phishing attacks? Let me show you! Want to see more, dive deeper? Join thisisIT: https://bit.ly/thisisitio (FREE) Join the NEW thisisIT Discord Server: https://bit.ly/discord_Tii This is Episode 2 of my FREE CompTIA Security+ course covering the SY0-501...

/ October 28, 2020

Discover latest security vulnerabilities in minutes with Detectify

25 minutes. That’s how long it took to bring high severity security vulnerabilities to Detectify  Asset Monitoring customers from the moment they were discovered. On a more technical side, our Security Researchers, led by Tom Hudson, implemented a high priority...

/ October 28, 2020

WordPress Maintenance Mode Without Plugin

In this tutorial you will learn how to turn on WordPress maintenance mode without plugin. This also works as a coming soon page. This tutorial is part of the Plugin Killer Series, you can see more of this series in...

/ October 27, 2020

Web Cache Entanglement – Novel Pathways to Poisoning

Each year we anticipate new research from James Kettle at the annual Black Hat USA event and he’s become known for his web cache research. This year he announced Web Cache Entanglement – new techniques to exploit web cache poisoning....

/ October 27, 2020

stop DDoSiNg my website!! (and other SCARY IT stories) Pt. 1

Want FREE IT courses? Join the thisisIT free tier: https://thisisIT.io

/ October 27, 2020

Synack Crowns the #Road2Tokyo Grand Champion

Winding its way through one of the most unique years in recent history, the #Road2Tokyo SRT Challenge has made its final stop, at least for 2020. Our nearly year-long HackerHangout series kicked-off in February with a lively event in Austin,...

/ October 26, 2020

3 Signs Your Phone Has Been Hacked! Protect your phone from hackers now!

Your phone contains the most sensitive data. A hacker will definitely want to go after your mobile device! Watch how a pro hacker identify a hacked device with 3 signs! Want to learn all about cyber-security and become an ethical...

/ October 26, 2020

Uncover Devices In Your Home WiFi Network!

There could be hackers residing in your home WiFi network! Watch a pro hacker demonstrate to you how you can check for unknown devices in your home WiFi network! Want to learn all about cyber-security and become an ethical hacker?...

/ October 26, 2020